期刊文献+
共找到79篇文章
< 1 2 4 >
每页显示 20 50 100
Computing Challenges of UAV Networks: A Comprehensive Survey
1
作者 Altaf Hussain Shuaiyong Li +3 位作者 Tariq Hussain Xianxuan Lin Farman Ali Ahmad Ali AlZubi 《Computers, Materials & Continua》 SCIE EI 2024年第11期1999-2051,共53页
Devices and networks constantly upgrade,leading to rapid technological evolution.Three-dimensional(3D)point cloud transmission plays a crucial role in aerial computing terminology,facilitating information exchange.Var... Devices and networks constantly upgrade,leading to rapid technological evolution.Three-dimensional(3D)point cloud transmission plays a crucial role in aerial computing terminology,facilitating information exchange.Various network types,including sensor networks and 5G mobile networks,support this transmission.Notably,Flying Ad hoc Networks(FANETs)utilize Unmanned Aerial Vehicles(UAVs)as nodes,operating in a 3D environment with Six Degrees of Freedom(6DoF).This study comprehensively surveys UAV networks,focusing on models for Light Detection and Ranging(LiDAR)3D point cloud compression/transmission.Key topics covered include autonomous navigation,challenges in video streaming infrastructure,motivations for Quality of Experience(QoE)enhancement,and avenues for future research.Additionally,the paper conducts an extensive review of UAVs,encompassing current wireless technologies,applications across various sectors,routing protocols,design considerations,security measures,blockchain applications in UAVs,contributions to healthcare systems,and integration with the Internet of Things(IoT),Artificial Intelligence(AI),Machine Learning(ML),and Deep Learning(DL).Furthermore,the paper thoroughly discusses the core contributions of LiDAR 3D point clouds in UAV systems and their future prediction along with mobility models.It also explores the prospects of UAV systems and presents state-of-the-art solutions. 展开更多
关键词 Autonomous vehicles UAV systems UAV transmission UAV in healthcare future of UAV system security measures
在线阅读 下载PDF
Big Data and Data Science:Opportunities and Challenges of iSchools 被引量:15
2
作者 Il-Yeol Song Yongjun Zhu 《Journal of Data and Information Science》 CSCD 2017年第3期1-18,共18页
Due to the recent explosion of big data, our society has been rapidly going through digital transformation and entering a new world with numerous eye-opening developments. These new trends impact the society and futur... Due to the recent explosion of big data, our society has been rapidly going through digital transformation and entering a new world with numerous eye-opening developments. These new trends impact the society and future jobs, and thus student careers. At the heart of this digital transformation is data science, the discipline that makes sense of big data. With many rapidly emerging digital challenges ahead of us, this article discusses perspectives on iSchools' opportunities and suggestions in data science education. We argue that iSchools should empower their students with "information computing" disciplines, which we define as the ability to solve problems and create values, information, and knowledge using tools in application domains. As specific approaches to enforcing information computing disciplines in data science education, we suggest the three foci of user-based, tool-based, and application- based. These three loci will serve to differentiate the data science education of iSchools from that of computer science or business schools. We present a layered Data Science Education Framework (DSEF) with building blocks that include the three pillars of data science (people, technology, and data), computational thinking, data-driven paradigms, and data science lifecycles. Data science courses built on the top of this framework should thus be executed with user-based, tool-based, and application-based approaches. This framework will help our students think about data science problems from the big picture perspective and foster appropriate problem-solving skills in conjunction with broad perspectives of data science lifecycles. We hope the DSEF discussed in this article will help fellow iSchools in their design of new data science curricula. 展开更多
关键词 Big data Data science Information computing The fourth Industrial Revolution ISCHOOL Computational thinking Data-driven paradigm Data science lifecycle
在线阅读 下载PDF
Importance of Features Selection,Attributes Selection,Challenges and Future Directions for Medical Imaging Data:A Review 被引量:6
3
作者 Nazish Naheed Muhammad Shaheen +2 位作者 Sajid Ali Khan Mohammed Alawairdhi Muhammad Attique Khan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2020年第10期315-344,共30页
In the area of pattern recognition and machine learning,features play a key role in prediction.The famous applications of features are medical imaging,image classification,and name a few more.With the exponential grow... In the area of pattern recognition and machine learning,features play a key role in prediction.The famous applications of features are medical imaging,image classification,and name a few more.With the exponential growth of information investments in medical data repositories and health service provision,medical institutions are collecting large volumes of data.These data repositories contain details information essential to support medical diagnostic decisions and also improve patient care quality.On the other hand,this growth also made it difficult to comprehend and utilize data for various purposes.The results of imaging data can become biased because of extraneous features present in larger datasets.Feature selection gives a chance to decrease the number of components in such large datasets.Through selection techniques,ousting the unimportant features and selecting a subset of components that produces prevalent characterization precision.The correct decision to find a good attribute produces a precise grouping model,which enhances learning pace and forecast control.This paper presents a review of feature selection techniques and attributes selection measures for medical imaging.This review is meant to describe feature selection techniques in a medical domainwith their pros and cons and to signify its application in imaging data and data mining algorithms.The review reveals the shortcomings of the existing feature and attributes selection techniques to multi-sourced data.Moreover,this review provides the importance of feature selection for correct classification of medical infections.In the end,critical analysis and future directions are provided. 展开更多
关键词 Medical imaging imaging data feature selection data mining attribute selection medical challenges future directions
在线阅读 下载PDF
Intelligent Identification and Resolution of Software Requirement Conflicts:Assessment and Evaluation
4
作者 Maysoon Aldekhail Marwah Almasri 《Computer Systems Science & Engineering》 SCIE EI 2022年第2期469-489,共21页
Considerable research has demonstrated how effective requirements engineering is critical for the success of software projects.Requirements engineering has been established and recognized as one of the most important ... Considerable research has demonstrated how effective requirements engineering is critical for the success of software projects.Requirements engineering has been established and recognized as one of the most important aspects of software engineering as of late.It is noteworthy to mention that requirement consistency is a critical factor in project success,and conflicts in requirements lead to waste of cost,time,and effort.A considerable number of research studies have shown the risks and problems caused by working with requirements that are in conflict with other requirements.These risks include running overtime or over budget,which may lead to project failure.At the very least,it would result in the extra expended effort.Various studies have also stated that failure in managing requirement conflicts is one of the main reasons for unsuccessful software projects due to high cost and insufficient time.Many prior research studies have proposed manual techniques to detect conflicts,whereas other research recommends automated approaches based on human analysis.Moreover,there are different resolutions for conflicting requirements.Our previous work proposed a scheme for dealing with this problem using a novel intelligent method to detect conflicts and resolve them.A rule-based system was proposed to identify conflicts in requirements,and a genetic algorithm(GA)was used to resolve conflicts.The objective of this work is to assess and evaluate the implementation of the method of minimizing the number of conflicts in the requirements.The methodology implemented comprises two different stages.The first stage,detecting conflicts using a rule-based system,demonstrated a correct result with 100% accuracy.The evaluation of using the GA to resolve and reduce conflicts in the second stage also displayed a good result and achieved the desired goal as well as the main objective of the research. 展开更多
关键词 Requirement conflicts genetic algorithm rule-based system software requirements requirements engineering
在线阅读 下载PDF
Early Detection of Alzheimer’s Disease Based on Laplacian Re-Decomposition and XGBoosting
5
作者 Hala Ahmed Hassan Soliman +2 位作者 Shaker El-Sappagh Tamer Abuhmed Mohammed Elmogy 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期2773-2795,共23页
The precise diagnosis of Alzheimer’s disease is critical for patient treatment,especially at the early stage,because awareness of the severity and progression risks lets patients take preventative actions before irre... The precise diagnosis of Alzheimer’s disease is critical for patient treatment,especially at the early stage,because awareness of the severity and progression risks lets patients take preventative actions before irreversible brain damage occurs.It is possible to gain a holistic view of Alzheimer’s disease staging by combining multiple data modalities,known as image fusion.In this paper,the study proposes the early detection of Alzheimer’s disease using different modalities of Alzheimer’s disease brain images.First,the preprocessing was performed on the data.Then,the data augmentation techniques are used to handle overfitting.Also,the skull is removed to lead to good classification.In the second phase,two fusion stages are used:pixel level(early fusion)and feature level(late fusion).We fused magnetic resonance imaging and positron emission tomography images using early fusion(Laplacian Re-Decomposition)and late fusion(Canonical Correlation Analysis).The proposed system used magnetic resonance imaging and positron emission tomography to take advantage of each.Magnetic resonance imaging system’s primary benefits are providing images with excellent spatial resolution and structural information for specific organs.Positron emission tomography images can provide functional information and the metabolisms of particular tissues.This characteristic helps clinicians detect diseases and tumor progression at an early stage.Third,the feature extraction of fused images is extracted using a convolutional neural network.In the case of late fusion,the features are extracted first and then fused.Finally,the proposed system performs XGB to classify Alzheimer’s disease.The system’s performance was evaluated using accuracy,specificity,and sensitivity.All medical data were retrieved in the 2D format of 256×256 pixels.The classifiers were optimized to achieve the final results:for the decision tree,the maximum depth of a tree was 2.The best number of trees for the random forest was 60;for the support vector machine,the maximum depth was 4,and the kernel gamma was 0.01.The system achieved an accuracy of 98.06%,specificity of 94.32%,and sensitivity of 97.02%in the case of early fusion.Also,if the system achieved late fusion,accuracy was 99.22%,specificity was 96.54%,and sensitivity was 99.54%. 展开更多
关键词 Alzheimer’s disease(AD) machine learning(ML) image fusion Laplacian Re-decomposition(LRD) XGBoosting
在线阅读 下载PDF
Deep Learning Approach for Hand Gesture Recognition:Applications in Deaf Communication and Healthcare
6
作者 Khursheed Aurangzeb Khalid Javeed +3 位作者 Musaed Alhussein Imad Rida Syed Irtaza Haider Anubha Parashar 《Computers, Materials & Continua》 SCIE EI 2024年第1期127-144,共18页
Hand gestures have been used as a significant mode of communication since the advent of human civilization.By facilitating human-computer interaction(HCI),hand gesture recognition(HGRoc)technology is crucial for seaml... Hand gestures have been used as a significant mode of communication since the advent of human civilization.By facilitating human-computer interaction(HCI),hand gesture recognition(HGRoc)technology is crucial for seamless and error-free HCI.HGRoc technology is pivotal in healthcare and communication for the deaf community.Despite significant advancements in computer vision-based gesture recognition for language understanding,two considerable challenges persist in this field:(a)limited and common gestures are considered,(b)processing multiple channels of information across a network takes huge computational time during discriminative feature extraction.Therefore,a novel hand vision-based convolutional neural network(CNN)model named(HVCNNM)offers several benefits,notably enhanced accuracy,robustness to variations,real-time performance,reduced channels,and scalability.Additionally,these models can be optimized for real-time performance,learn from large amounts of data,and are scalable to handle complex recognition tasks for efficient human-computer interaction.The proposed model was evaluated on two challenging datasets,namely the Massey University Dataset(MUD)and the American Sign Language(ASL)Alphabet Dataset(ASLAD).On the MUD and ASLAD datasets,HVCNNM achieved a score of 99.23% and 99.00%,respectively.These results demonstrate the effectiveness of CNN as a promising HGRoc approach.The findings suggest that the proposed model have potential roles in applications such as sign language recognition,human-computer interaction,and robotics. 展开更多
关键词 Computer vision deep learning gait recognition sign language recognition machine learning
在线阅读 下载PDF
BHJO: A Novel Hybrid Metaheuristic Algorithm Combining the Beluga Whale, Honey Badger, and Jellyfish Search Optimizers for Solving Engineering Design Problems
7
作者 Farouq Zitouni Saad Harous +4 位作者 Abdulaziz S.Almazyad Ali Wagdy Mohamed Guojiang Xiong Fatima Zohra Khechiba Khadidja  Kherchouche 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期219-265,共47页
Hybridizing metaheuristic algorithms involves synergistically combining different optimization techniques to effectively address complex and challenging optimization problems.This approach aims to leverage the strengt... Hybridizing metaheuristic algorithms involves synergistically combining different optimization techniques to effectively address complex and challenging optimization problems.This approach aims to leverage the strengths of multiple algorithms,enhancing solution quality,convergence speed,and robustness,thereby offering a more versatile and efficient means of solving intricate real-world optimization tasks.In this paper,we introduce a hybrid algorithm that amalgamates three distinct metaheuristics:the Beluga Whale Optimization(BWO),the Honey Badger Algorithm(HBA),and the Jellyfish Search(JS)optimizer.The proposed hybrid algorithm will be referred to as BHJO.Through this fusion,the BHJO algorithm aims to leverage the strengths of each optimizer.Before this hybridization,we thoroughly examined the exploration and exploitation capabilities of the BWO,HBA,and JS metaheuristics,as well as their ability to strike a balance between exploration and exploitation.This meticulous analysis allowed us to identify the pros and cons of each algorithm,enabling us to combine them in a novel hybrid approach that capitalizes on their respective strengths for enhanced optimization performance.In addition,the BHJO algorithm incorporates Opposition-Based Learning(OBL)to harness the advantages offered by this technique,leveraging its diverse exploration,accelerated convergence,and improved solution quality to enhance the overall performance and effectiveness of the hybrid algorithm.Moreover,the performance of the BHJO algorithm was evaluated across a range of both unconstrained and constrained optimization problems,providing a comprehensive assessment of its efficacy and applicability in diverse problem domains.Similarly,the BHJO algorithm was subjected to a comparative analysis with several renowned algorithms,where mean and standard deviation values were utilized as evaluation metrics.This rigorous comparison aimed to assess the performance of the BHJOalgorithmabout its counterparts,shedding light on its effectiveness and reliability in solving optimization problems.Finally,the obtained numerical statistics underwent rigorous analysis using the Friedman post hoc Dunn’s test.The resulting numerical values revealed the BHJO algorithm’s competitiveness in tackling intricate optimization problems,affirming its capability to deliver favorable outcomes in challenging scenarios. 展开更多
关键词 Global optimization hybridization of metaheuristics beluga whale optimization honey badger algorithm jellyfish search optimizer chaotic maps opposition-based learning
在线阅读 下载PDF
Intelligent Solution System for Cloud Security Based on Equity Distribution:Model and Algorithms
8
作者 Sarah Mustafa Eljack Mahdi Jemmali +3 位作者 Mohsen Denden Mutasim Al Sadig Abdullah M.Algashami Sadok Turki 《Computers, Materials & Continua》 SCIE EI 2024年第1期1461-1479,共19页
In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding ... In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding the risk of data loss and data overlapping.The development of data flow scheduling approaches in the cloud environment taking security parameters into account is insufficient.In our work,we propose a data scheduling model for the cloud environment.Themodel is made up of three parts that together help dispatch user data flow to the appropriate cloudVMs.The first component is the Collector Agent whichmust periodically collect information on the state of the network links.The second one is the monitoring agent which must then analyze,classify,and make a decision on the state of the link and finally transmit this information to the scheduler.The third one is the scheduler who must consider previous information to transfer user data,including fair distribution and reliable paths.It should be noted that each part of the proposedmodel requires the development of its algorithms.In this article,we are interested in the development of data transfer algorithms,including fairness distribution with the consideration of a stable link state.These algorithms are based on the grouping of transmitted files and the iterative method.The proposed algorithms showthe performances to obtain an approximate solution to the studied problem which is an NP-hard(Non-Polynomial solution)problem.The experimental results show that the best algorithm is the half-grouped minimum excluding(HME),with a percentage of 91.3%,an average deviation of 0.042,and an execution time of 0.001 s. 展开更多
关键词 Cyber-security cloud computing cloud security ALGORITHMS HEURISTICS
在线阅读 下载PDF
Identification of Software Bugs by Analyzing Natural Language-Based Requirements Using Optimized Deep Learning Features
9
作者 Qazi Mazhar ul Haq Fahim Arif +4 位作者 Khursheed Aurangzeb Noor ul Ain Javed Ali Khan Saddaf Rubab Muhammad Shahid Anwar 《Computers, Materials & Continua》 SCIE EI 2024年第3期4379-4397,共19页
Software project outcomes heavily depend on natural language requirements,often causing diverse interpretations and issues like ambiguities and incomplete or faulty requirements.Researchers are exploring machine learn... Software project outcomes heavily depend on natural language requirements,often causing diverse interpretations and issues like ambiguities and incomplete or faulty requirements.Researchers are exploring machine learning to predict software bugs,but a more precise and general approach is needed.Accurate bug prediction is crucial for software evolution and user training,prompting an investigation into deep and ensemble learning methods.However,these studies are not generalized and efficient when extended to other datasets.Therefore,this paper proposed a hybrid approach combining multiple techniques to explore their effectiveness on bug identification problems.The methods involved feature selection,which is used to reduce the dimensionality and redundancy of features and select only the relevant ones;transfer learning is used to train and test the model on different datasets to analyze how much of the learning is passed to other datasets,and ensemble method is utilized to explore the increase in performance upon combining multiple classifiers in a model.Four National Aeronautics and Space Administration(NASA)and four Promise datasets are used in the study,showing an increase in the model’s performance by providing better Area Under the Receiver Operating Characteristic Curve(AUC-ROC)values when different classifiers were combined.It reveals that using an amalgam of techniques such as those used in this study,feature selection,transfer learning,and ensemble methods prove helpful in optimizing the software bug prediction models and providing high-performing,useful end mode. 展开更多
关键词 Natural language processing software bug prediction transfer learning ensemble learning feature selection
在线阅读 下载PDF
UNet Based onMulti-Object Segmentation and Convolution Neural Network for Object Recognition
10
作者 Nouf Abdullah Almujally Bisma Riaz Chughtai +4 位作者 Naif Al Mudawi Abdulwahab Alazeb Asaad Algarni Hamdan A.Alzahrani Jeongmin Park 《Computers, Materials & Continua》 SCIE EI 2024年第7期1563-1580,共18页
The recent advancements in vision technology have had a significant impact on our ability to identify multiple objects and understand complex scenes.Various technologies,such as augmented reality-driven scene integrat... The recent advancements in vision technology have had a significant impact on our ability to identify multiple objects and understand complex scenes.Various technologies,such as augmented reality-driven scene integration,robotic navigation,autonomous driving,and guided tour systems,heavily rely on this type of scene comprehension.This paper presents a novel segmentation approach based on the UNet network model,aimed at recognizing multiple objects within an image.The methodology begins with the acquisition and preprocessing of the image,followed by segmentation using the fine-tuned UNet architecture.Afterward,we use an annotation tool to accurately label the segmented regions.Upon labeling,significant features are extracted from these segmented objects,encompassing KAZE(Accelerated Segmentation and Extraction)features,energy-based edge detection,frequency-based,and blob characteristics.For the classification stage,a convolution neural network(CNN)is employed.This comprehensive methodology demonstrates a robust framework for achieving accurate and efficient recognition of multiple objects in images.The experimental results,which include complex object datasets like MSRC-v2 and PASCAL-VOC12,have been documented.After analyzing the experimental results,it was found that the PASCAL-VOC12 dataset achieved an accuracy rate of 95%,while the MSRC-v2 dataset achieved an accuracy of 89%.The evaluation performed on these diverse datasets highlights a notably impressive level of performance. 展开更多
关键词 UNet segmentation BLOB fourier transform convolution neural network
在线阅读 下载PDF
Big Metadata,Smart Metadata,and Metadata Capital:Toward Greater Synergy Between Data Science and Metadata 被引量:6
11
作者 Jane Greenberg 《Journal of Data and Information Science》 CSCD 2017年第3期19-36,共18页
Purpose: The purpose of the paper is to provide a framework for addressing the disconnect between metadata and data science. Data science cannot progress without metadata research.This paper takes steps toward advanc... Purpose: The purpose of the paper is to provide a framework for addressing the disconnect between metadata and data science. Data science cannot progress without metadata research.This paper takes steps toward advancing the synergy between metadata and data science, and identifies pathways for developing a more cohesive metadata research agenda in data science. Design/methodology/approach: This paper identifies factors that challenge metadata research in the digital ecosystem, defines metadata and data science, and presents the concepts big metadata, smart metadata, and metadata capital as part of a metadata lingua franca connecting to data science. Findings: The "utilitarian nature" and "historical and traditional views" of metadata are identified as two intersecting factors that have inhibited metadata research. Big metadata, smart metadata, and metadata capital are presented as part ofa metadata linguafranca to help frame research in the data science research space. Research limitations: There are additional, intersecting factors to consider that likely inhibit metadata research, and other significant metadata concepts to explore. Practical implications: The immediate contribution of this work is that it may elicit response, critique, revision, or, more significantly, motivate research. The work presented can encourage more researchers to consider the significance of metadata as a research worthy topic within data science and the larger digital ecosystem. Originality/value: Although metadata research has not kept pace with other data science topics, there is little attention directed to this problem. This is surprising, given that metadata is essential for data science endeavors. This examination synthesizes original and prior scholarship to provide new grounding for metadata research in data science. 展开更多
关键词 Metadata research Data science Big metadata Smart metadata Metadata capital
在线阅读 下载PDF
Science Mapping:A Systematic Review of the Literature 被引量:749
12
作者 Chaomei Chen 《Journal of Data and Information Science》 CSCD 2017年第2期1-40,共40页
Purpose: We present a systematic review of the literature concerning major aspects of science mapping to serve two primary purposes: First, to demonstrate the use of a science mapping approach to perform the review ... Purpose: We present a systematic review of the literature concerning major aspects of science mapping to serve two primary purposes: First, to demonstrate the use of a science mapping approach to perform the review so that researchers may apply the procedure to the review of a scientific domain of their own interest, and second, to identify major areas of research activities concerning science mapping, intellectual milestones in the development of key specialties, evolutionary stages of major specialties involved, and the dynamics of transitions from one specialty to another.Design/methodology/approach: We first introduce a theoretical framework of the evolution of a scientific specialty. Then we demonstrate a generic search strategy that can be used to construct a representative dataset of bibliographic records of a domain of research. Next, progressively synthesized co-citation networks are constructed and visualized to aid visual analytic studies of the domain's structural and dynamic patterns and trends. Finally, trajectories of citations made by particular types of authors and articles are presented to illustrate the predictive potential of the analytic approach.Findings: The evolution of the science mapping research involves the development of a number of interrelated specialties. Four major specialties are discussed in detail in terms of four evolutionary stages: conceptualization, tool construction, application, and codification. Underlying connections between major specialties are also explored. The predictive analysis demonstrates citations trajectories of potentially transformative contributions.Research limitations: The systematic review is primarily guided by citation patterns in the dataset retrieved from the literature. The scope of the data is limited by the source of the retrieval, i.e. the Web of Science, and the composite query used. An iterative query refinement is possible if one would like to improve the data quality, although the current approach serves our purpose adequately. More in-depth analyses of each specialty would be more revealing by incorporating additional methods such as citation context analysis and studies of other aspects of scholarly publications.Practical implications: The underlying analytic process of science mapping serves many practical needs, notably bibliometric mapping, knowledge domain visualization, and visualization of scientific literature. In order to master such a complex process of science mapping, researchers often need to develop a diverse set of skills and knowledge that may span multiple disciplines. The approach demonstrated in this article provides a generic method for conducting a systematic review.Originality/value: Incorporating the evolutionary stages of a specialty into the visual analytic study of a research domain is innovative. It provides a systematic methodology for researchers to achieve a good understanding of how scientific fields evolve, to recognize potentially insightful patterns from visually encoded signs, and to synthesize various information so as to capture the state of the art of the domain. 展开更多
关键词 Science mapping Knowledge domain visualization Domain analysis Systematic review Cite Space
在线阅读 下载PDF
A Survey of Applications Research on Content-Centric Networking 被引量:2
13
作者 Xiuquan Qiao Hongyi Wang +3 位作者 Wei Tan Athanasios V.Vasilakos Junliang Chen MBrian Blake 《China Communications》 SCIE CSCD 2019年第9期122-140,共19页
As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholl... As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholly driven by the data consumer.Consumers must send Interest packets with the content name and not by the host’s network address.Its nature of in-network caching,Interest packets aggregation and hop-byhop communication poses unique challenges to provision of Internet applications,where traditional IP network no long works well.This paper presents a comprehensive survey of state-of-the-art application research activities related to CCN architecture.Our main aims in this survey are(a)to identify the advantages and drawbacks of CCN architectures for application provisioning;(b)to discuss the challenges and opportunities regarding service provisioning in CCN architectures;and(c)to further encourage deeper thinking about design principles for future Internet architectures from the perspective of upper-layer applications. 展开更多
关键词 Content-centric networking(CCN) named-data NETWORKING (NDN) APPLICATIONS information-centric NETWORKING FUTURE Internet
在线阅读 下载PDF
Hyperledger Fabric Blockchain: Secure and Efficient Solution for Electronic Health Records 被引量:2
14
作者 Mueen Uddin M.S.Memon +4 位作者 Irfana Memon Imtiaz Ali Jamshed Memon Maha Abdelhaq Raed Alsaqour 《Computers, Materials & Continua》 SCIE EI 2021年第8期2377-2397,共21页
Background:Electronic Health Record(EHR)systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare ind... Background:Electronic Health Record(EHR)systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare industry to achieve better diagnosis and treatment of patients globally.However,the existing EHR systems mostly lack in providing appropriate security,entrusted access control and handling privacy and secrecy issues and challenges in current hospital infrastructures.Objective:To solve this delicate problem,we propose a Blockchain-enabled Hyperledger Fabric Architecture for different EHR systems.Methodology:In our EHR blockchain system,Peer nodes from various organizations(stakeholders)create a ledger network,where channels are created to enable secure and private communication between different stakeholders on the ledger network.Individual patients and other stakeholders are identified and registered on the network by unique digital certificates issued by membership service provider(MSP)component of the fabric architecture.Results:We created and implemented different Chaincodes to handle the business logic for executing separate EHR transactions on the network.The proposed fabric architecture provides a secure,transparent and immutable mechanism to store,share and exchange EHRs in a peer-to-peer network of different healthcare stakeholders.It ensures interoperability,scalability and availability in adapting the existing EHRs for strengthening and providing an effective and secure method to integrate and manage patient records among medical institutions in the healthcare ecosystem. 展开更多
关键词 Electronic health records blockchain hyperledger fabric patient data privacy private permissioned blockchain healthcare ecosystem
在线阅读 下载PDF
Intrusion Detection System Using FKNN and Improved PSO 被引量:1
15
作者 Raniyah Wazirali 《Computers, Materials & Continua》 SCIE EI 2021年第5期1429-1445,共17页
Intrusion detection system(IDS)techniques are used in cybersecurity to protect and safeguard sensitive assets.The increasing network security risks can be mitigated by implementing effective IDS methods as a defense m... Intrusion detection system(IDS)techniques are used in cybersecurity to protect and safeguard sensitive assets.The increasing network security risks can be mitigated by implementing effective IDS methods as a defense mechanism.The proposed research presents an IDS model based on the methodology of the adaptive fuzzy k-nearest neighbor(FKNN)algorithm.Using this method,two parameters,i.e.,the neighborhood size(k)and fuzzy strength parameter(m)were characterized by implementing the particle swarm optimization(PSO).In addition to being used for FKNN parametric optimization,PSO is also used for selecting the conditional feature subsets for detection.To proficiently regulate the indigenous and comprehensive search skill of the PSO approach,two control parameters containing the time-varying inertia weight(TVIW)and time-varying acceleration coefficients(TVAC)were applied to the system.In addition,continuous and binary PSO algorithms were both executed on a multi-core platform.The proposed IDS model was compared with other state-of-the-art classifiers.The results of the proposed methodology are superior to the rest of the techniques in terms of the classification accuracy,precision,recall,and f-score.The results showed that the proposed methods gave the highest performance scores compared to the other conventional algorithms in detecting all the attack types in two datasets.Moreover,the proposed method was able to obtain a large number of true positives and negatives,with minimal number of false positives and negatives. 展开更多
关键词 FKNN PSO approach machine learning-based cybersecurity intrusion detection
在线阅读 下载PDF
Multi-Criteria Prediction Mechanism for Vehicular Wi-Fi Offloading 被引量:1
16
作者 Mahmoud Alawi Raed Alsaqour +2 位作者 Abdi Abdalla Maha Abdelhaq Mueen Uddin 《Computers, Materials & Continua》 SCIE EI 2021年第11期2313-2337,共25页
The growing demands of vehicular network applications,which have diverse networking and multimedia capabilities that passengers use while traveling,cause an overload of cellular networks.This scenario affects the qual... The growing demands of vehicular network applications,which have diverse networking and multimedia capabilities that passengers use while traveling,cause an overload of cellular networks.This scenario affects the quality of service(QoS)of vehicle and non-vehicle users.Nowadays,wireless fidelity access points Wi-Fi access point(AP)and fourth generation long-term evolution advanced(4G LTE-A)networks are broadly accessible.Wi-Fi APs can be utilized by vehicle users to stabilize 4G LTE-A networks.However,utilizing the opportunistic Wi-Fi APs to offload the 4G LTE-A networks in a vehicular ad hoc network environment is a relatively difficult task.This condition is due to the short coverage of Wi-Fi APs and weak deployment strategies of APs.Many studies have proposed that offloading mechanisms depend on the historical Wi-Fi connection patterns observed by an interest vehicle in making an offloading decision.However,depending solely on the historical connection patterns affects the prediction accuracy and offloading ratio of most existing mechanisms even when AP location information is available.The present study proposed a multi-criteria wireless availability prediction(MWAP)mechanism,which utilizes historical connection patterns,historical data rate information,and vehicular trajectory computation to predict the next available AP and its expected data capacity in making offloading decisions.The proposed mechanism is decentralized,where each vehicle makes the prediction by itself.This characteristic helps the vehicle users make a proactive offloading decision that maintains the QoS for different applications.A simulation utilizing MATLAB was conducted to evaluate the performance of the proposed mechanism and benchmark it with related state-of-the-art mechanisms.A comparison was made based on the prediction error and offloading ratio of the proposed mechanism in several scenarios.The MWAP mechanism exhibited a lower prediction error(i.e.,below 20%)and higher offloading ratio(i.e.,above 90%)than the existing mechanisms for several tested scenarios. 展开更多
关键词 Vehicular network markov predictor 4G LTE-A Wi-Fi offloading prediction model heterogeneous network
在线阅读 下载PDF
Hybrid Feature Extractions and CNN for Enhanced Periocular Identification During Covid-19 被引量:1
17
作者 Raniyah Wazirali Rami Ahmed 《Computer Systems Science & Engineering》 SCIE EI 2022年第4期305-320,共16页
The global pandemic of novel coronavirus that started in 2019 has ser-iously affected daily lives and placed everyone in a panic condition.Widespread coronavirus led to the adoption of social distancing and people avo... The global pandemic of novel coronavirus that started in 2019 has ser-iously affected daily lives and placed everyone in a panic condition.Widespread coronavirus led to the adoption of social distancing and people avoiding unneces-sary physical contact with each other.The present situation advocates the require-ment of a contactless biometric system that could be used in future authentication systems which makesfingerprint-based person identification ineffective.Periocu-lar biometric is the solution because it does not require physical contact and is able to identify people wearing face masks.However,the periocular biometric region is a small area,and extraction of the required feature is the point of con-cern.This paper has proposed adopted multiple features and emphasis on the periocular region.In the proposed approach,combination of local binary pattern(LBP),color histogram and features in frequency domain have been used with deep learning algorithms for classification.Hence,we extract three types of fea-tures for the classification of periocular regions for biometric.The LBP represents the textual features of the iris while the color histogram represents the frequencies of pixel values in the RGB channel.In order to extract the frequency domain fea-tures,the wavelet transformation is obtained.By learning from these features,a convolutional neural network(CNN)becomes able to discriminate the features and can provide better recognition results.The proposed approach achieved the highest accuracy rates with the lowest false person identification. 展开更多
关键词 Person identification convolutional neural network local binary pattern periocular region Covid-19
在线阅读 下载PDF
A Machine Learning-Based Attack Detection and Prevention System in Vehicular Named Data Networking 被引量:1
18
作者 Arif Hussain Magsi Ali Ghulam +3 位作者 Saifullah Memon Khalid Javeed Musaed Alhussein Imad Rida 《Computers, Materials & Continua》 SCIE EI 2023年第11期1445-1465,共21页
Named Data Networking(NDN)is gaining a significant attention in Vehicular Ad-hoc Networks(VANET)due to its in-network content caching,name-based routing,and mobility-supporting characteristics.Nevertheless,existing ND... Named Data Networking(NDN)is gaining a significant attention in Vehicular Ad-hoc Networks(VANET)due to its in-network content caching,name-based routing,and mobility-supporting characteristics.Nevertheless,existing NDN faces three significant challenges,including security,privacy,and routing.In particular,security attacks,such as Content Poisoning Attacks(CPA),can jeopardize legitimate vehicles with malicious content.For instance,attacker host vehicles can serve consumers with invalid information,which has dire consequences,including road accidents.In such a situation,trust in the content-providing vehicles brings a new challenge.On the other hand,ensuring privacy and preventing unauthorized access in vehicular(VNDN)is another challenge.Moreover,NDN’s pull-based content retrieval mechanism is inefficient for delivering emergency messages in VNDN.In this connection,our contribution is threefold.Unlike existing rule-based reputation evaluation,we propose a Machine Learning(ML)-based reputation evaluation mechanism that identifies CPA attackers and legitimate nodes.Based on ML evaluation results,vehicles accept or discard served content.Secondly,we exploit a decentralized blockchain system to ensure vehicles’privacy by maintaining their information in a secure digital ledger.Finally,we improve the default routing mechanism of VNDN from pull to a push-based content dissemination using Publish-Subscribe(Pub-Sub)approach.We implemented and evaluated our ML-based classification model on a publicly accessible BurST-Asutralian dataset for Misbehavior Detection(BurST-ADMA).We used five(05)hybrid ML classifiers,including Logistic Regression,Decision Tree,K-Nearest Neighbors,Random Forest,and Gaussian Naive Bayes.The qualitative results indicate that Random Forest has achieved the highest average accuracy rate of 100%.Our proposed research offers the most accurate solution to detect CPA in VNDN for safe,secure,and reliable vehicle communication. 展开更多
关键词 Named data networking vehicular networks REPUTATION CACHING MACHINE-LEARNING
在线阅读 下载PDF
Artificial Neural Networks for Prediction of COVID-19 in Saudi Arabia 被引量:1
19
作者 Nawaf N.Hamadneh Waqar A.Khan +3 位作者 Waqar Ashraf Samer H.Atawneh Ilyas Khan Bandar N.Hamadneh 《Computers, Materials & Continua》 SCIE EI 2021年第3期2787-2796,共10页
In this study,we have proposed an artificial neural network(ANN)model to estimate and forecast the number of confirmed and recovered cases of COVID-19 in the upcoming days until September 17,2020.The proposed model is... In this study,we have proposed an artificial neural network(ANN)model to estimate and forecast the number of confirmed and recovered cases of COVID-19 in the upcoming days until September 17,2020.The proposed model is based on the existing data(training data)published in the Saudi Arabia Coronavirus disease(COVID-19)situation—Demographics.The Prey-Predator algorithm is employed for the training.Multilayer perceptron neural network(MLPNN)is used in this study.To improve the performance of MLPNN,we determined the parameters of MLPNN using the prey-predator algorithm(PPA).The proposed model is called the MLPNN–PPA.The performance of the proposed model has been analyzed by the root mean squared error(RMSE)function,and correlation coefficient(R).Furthermore,we tested the proposed model using other existing data recorded in Saudi Arabia(testing data).It is demonstrated that the MLPNN-PPA model has the highest performance in predicting the number of infected and recovering in Saudi Arabia.The results reveal that the number of infected persons will increase in the coming days and become a minimum of 9789.The number of recoveries will be 2000 to 4000 per day. 展开更多
关键词 COVID-19 ANN modeling multilayer perceptron neural network prey-predator algorithm
在线阅读 下载PDF
Smart Bubble Sort:A Novel and Dynamic Variant of Bubble Sort Algorithm
20
作者 Mohammad Khalid Imam Rahmani 《Computers, Materials & Continua》 SCIE EI 2022年第6期4895-4913,共19页
In the present era,a very huge volume of data is being stored in online and offline databases.Enterprise houses,research,medical as well as healthcare organizations,and academic institutions store data in databases an... In the present era,a very huge volume of data is being stored in online and offline databases.Enterprise houses,research,medical as well as healthcare organizations,and academic institutions store data in databases and their subsequent retrievals are performed for further processing.Finding the required data from a given database within the minimum possible time is one of the key factors in achieving the best possible performance of any computer-based application.If the data is already sorted,finding or searching is comparatively faster.In real-life scenarios,the data collected from different sources may not be in sorted order.Sorting algorithms are required to arrange the data in some order in the least possible time.In this paper,I propose an intelligent approach towards designing a smart variant of the bubble sort algorithm.I call it Smart Bubble sort that exhibits dynamic footprint:The capability of adapting itself from the average-case to the best-case scenario.It is an in-place sorting algorithm and its best-case time complexity isΩ(n).It is linear and better than bubble sort,selection sort,and merge sort.In averagecase and worst-case analyses,the complexity estimates are based on its static footprint analyses.Its complexity in worst-case is O(n2)and in average-case isΘ(n^(2)).Smart Bubble sort is capable of adapting itself to the best-case scenario from the average-case scenario at any subsequent stages due to its dynamic and intelligent nature.The Smart Bubble sort outperforms bubble sort,selection sort,and merge sort in the best-case scenario whereas it outperforms bubble sort in the average-case scenario. 展开更多
关键词 Sorting algorithms smart bubble sort footprint dynamic footprint time complexity asymptotic analysis
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部