期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
Traffic Control Based on Integrated Kalman Filtering and Adaptive Quantized Q-Learning Framework for Internet of Vehicles
1
作者 Othman S.Al-Heety Zahriladha Zakaria +4 位作者 Ahmed Abu-Khadrah Mahamod Ismail Sarmad Nozad Mahmood Mohammed Mudhafar Shakir Hussein Alsariera 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2103-2127,共25页
Intelligent traffic control requires accurate estimation of the road states and incorporation of adaptive or dynamically adjusted intelligent algorithms for making the decision.In this article,these issues are handled... Intelligent traffic control requires accurate estimation of the road states and incorporation of adaptive or dynamically adjusted intelligent algorithms for making the decision.In this article,these issues are handled by proposing a novel framework for traffic control using vehicular communications and Internet of Things data.The framework integrates Kalman filtering and Q-learning.Unlike smoothing Kalman filtering,our data fusion Kalman filter incorporates a process-aware model which makes it superior in terms of the prediction error.Unlike traditional Q-learning,our Q-learning algorithm enables adaptive state quantization by changing the threshold of separating low traffic from high traffic on the road according to the maximum number of vehicles in the junction roads.For evaluation,the model has been simulated on a single intersection consisting of four roads:east,west,north,and south.A comparison of the developed adaptive quantized Q-learning(AQQL)framework with state-of-the-art and greedy approaches shows the superiority of AQQL with an improvement percentage in terms of the released number of vehicles of AQQL is 5%over the greedy approach and 340%over the state-of-the-art approach.Hence,AQQL provides an effective traffic control that can be applied in today’s intelligent traffic system. 展开更多
关键词 Q-LEARNING intelligent transportation system(ITS) traffic control vehicular communication kalman filtering smart city Internet of Things
在线阅读 下载PDF
Deep Reinforcement Learning-Based Task Offloading and Service Migrating Policies in Service Caching-Assisted Mobile Edge Computing
2
作者 Ke Hongchang Wang Hui +1 位作者 Sun Hongbin Halvin Yang 《China Communications》 SCIE CSCD 2024年第4期88-103,共16页
Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy.... Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy.Due to the homogeneity of request tasks from one MWE during a longterm time period,it is vital to predeploy the particular service cachings required by the request tasks at the MEC server.In this paper,we model a service caching-assisted MEC framework that takes into account the constraint on the number of service cachings hosted by each edge server and the migration of request tasks from the current edge server to another edge server with service caching required by tasks.Furthermore,we propose a multiagent deep reinforcement learning-based computation offloading and task migrating decision-making scheme(MBOMS)to minimize the long-term average weighted cost.The proposed MBOMS can learn the near-optimal offloading and migrating decision-making policy by centralized training and decentralized execution.Systematic and comprehensive simulation results reveal that our proposed MBOMS can converge well after training and outperforms the other five baseline algorithms. 展开更多
关键词 deep reinforcement learning mobile edge computing service caching service migrating
在线阅读 下载PDF
Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks
3
作者 Vincent Omollo Nyangaresi Arkan A.Ghaib +6 位作者 Hend Muslim Jasim Zaid Ameen Abduljabbar Junchao Ma Mustafa A.Al Sibahee Abdulla J.Y.Aldarwish Ali Hasan Ali Husam A.Neamah 《Computers, Materials & Continua》 SCIE EI 2024年第10期1029-1057,共29页
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages ov... Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations.To address these challenges,several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently.However,most of these schemes are limited by a long execution time and massive communication costs,which make them inefficient for on-board units(OBUs).Additionally,some of them are still susceptible to many attacks.As such,this study presents a novel protocol based on the fusion of elliptic curve cryptography(ECC)and bilinear pairing(BP)operations.The formal security analysis is accomplished using the Burrows–Abadi–Needham(BAN)logic,demonstrating that our scheme is verifiably secure.The proposed scheme’s informal security assessment also shows that it provides salient security features,such as non-repudiation,anonymity,and unlinkability.Moreover,the scheme is shown to be resilient against attacks,such as packet replays,forgeries,message falsifications,and impersonations.From the performance perspective,this protocol yields a 37.88%reduction in communication overheads and a 44.44%improvement in the supported security features.Therefore,the proposed scheme can be deployed in VANETs to provide robust security at low overheads. 展开更多
关键词 ATTACKS BILINEAR elliptic curve cryptography(ECC) PRIVACY SECURITY vehicular ad hoc network(VANET)
在线阅读 下载PDF
Genetic Algorithm Routing Protocol for Mobile Ad Hoc Network 被引量:1
4
作者 Raed Alsaqour Saif Kamal +1 位作者 Maha Abdelhaq Yazan Al Jeroudi 《Computers, Materials & Continua》 SCIE EI 2021年第7期941-960,共20页
Mobile ad hoc network(MANET)is a dynamically reconfigurable wireless network with time-variable infrastructure.Given that nodes are highly mobile,MANET’s topology often changes.These changes increase the difficulty i... Mobile ad hoc network(MANET)is a dynamically reconfigurable wireless network with time-variable infrastructure.Given that nodes are highly mobile,MANET’s topology often changes.These changes increase the difficulty in finding the routes that the packets use when they are routed.This study proposes an algorithm called genetic algorithm-based location-aided routing(GALAR)to enhance the MANET routing protocol efficiency.The GALAR algorithm maintains an adaptive update of the node location information by adding the transmitting node location information to the routing packet and selecting the transmitting node to carry the packets to their destination.The GALAR was constructed based on a genetic optimization scheme that considers all contributing factors in the delivery behavior using criterion function optimization.Simulation results showed that the GALAR algorithm can make the probability of packet delivery ratio more than 99%with less network overhead.Moreover,GALAR was compared to other algorithms in terms of different network evaluation measures.The GALAR algorithm significantly outperformed the other algorithms that were used in the study. 展开更多
关键词 Mobile ad hoc network location-aided routing protocol location information genetic algorithm
在线阅读 下载PDF
A Study of Efficient Power Consumption Wireless Communication Techniques/ Modules for Internet of Things (IoT) Applications 被引量:3
5
作者 Mahmoud Shuker Mahmoud Auday A. H. Mohamad 《Advances in Internet of Things》 2016年第2期19-29,共11页
A study of wireless technologies for IoT applications in terms of power consumption has been presented in this paper. The study focuses on the importance of using low power wireless techniques and modules in IoT appli... A study of wireless technologies for IoT applications in terms of power consumption has been presented in this paper. The study focuses on the importance of using low power wireless techniques and modules in IoT applications by introducing a comparative between different low power wireless communication techniques such as ZigBee, Low Power Wi-Fi, 6LowPAN, LPWA and their modules to conserve power and longing the life for the IoT network sensors. The approach of the study is in term of protocol used and the particular module that achieve that protocol. The candidate protocols are classified according to the range of connectivity between sensor nodes. For short ranges connectivity the candidate protocols are ZigBee, 6LoWPAN and low power Wi-Fi. For long connectivity the candidate is LoRaWAN protocol. The results of the study demonstrate that the choice of module for each protocol plays a vital role in battery life due to the difference of power consumption for each module/protocol. So, the evaluation of protocols with each other depends on the module used. 展开更多
关键词 IOT Wireless Sensor Networks Low Power Wireless Protocols Wireless Low Power Consumption Modules
在线阅读 下载PDF
Intrusion Detection System Through Deep Learning in Routing MANET Networks
6
作者 Zainab Ali Abbood DoguÇagdaşAtilla Çagatay Aydin 《Intelligent Automation & Soft Computing》 SCIE 2023年第7期269-281,共13页
Deep learning(DL)is a subdivision of machine learning(ML)that employs numerous algorithms,each of which provides various explanations of the data it consumes;mobile ad-hoc networks(MANET)are growing in promi-nence.For... Deep learning(DL)is a subdivision of machine learning(ML)that employs numerous algorithms,each of which provides various explanations of the data it consumes;mobile ad-hoc networks(MANET)are growing in promi-nence.For reasons including node mobility,due to MANET’s potential to provide small-cost solutions for real-world contact challenges,decentralized management,and restricted bandwidth,MANETs are more vulnerable to security threats.When protecting MANETs from attack,encryption and authentication schemes have their limits.However,deep learning(DL)approaches in intrusion detection sys-tems(IDS)can adapt to the changing environment of MANETs and allow a sys-tem to make intrusion decisions while learning about its mobility in the environment.IDSs are a secondary defiance system for mobile ad-hoc networks vs.attacks since they monitor network traffic and report anything unusual.Recently,many scientists have employed deep neural networks(DNNs)to address intrusion detection concerns.This paper used MANET to recognize com-plex patterns by focusing on security standards through efficiency determination and identifying malicious nodes,and mitigating network attacks using the three algorithms presented Cascading Back Propagation Neural Network(CBPNN),Feedforward-Neural-Network(FNN),and Cascading-Back-Propagation-Neural-Network(CBPNN)(FFNN).In addition to Convolutional-Neural-Network(CNN),these primary forms of deep neural network(DNN)building designs are widely used to improve the performance of intrusion detection systems(IDS)and the use of IDS in conjunction with machine learning(ML).Further-more,machine learning(ML)techniques than their statistical and logical methods provide MANET network learning capabilities and encourage adaptation to differ-ent environments.Compared with another current model,The proposed model has better average receiving packet(ARP)and end-to-end(E2E)performance.The results have been obtained from CBP,FFNN and CNN 74%,82%and 85%,respectively,by the time(27,18,and 17 s). 展开更多
关键词 ARP CBPNN CNN DNN DL E2E FFNN IDS ML MANET security
在线阅读 下载PDF
Ensemble of Handcrafted and Deep Learning Model for Histopathological Image Classification
7
作者 Vasumathi Devi Majety N.Sharmili +5 位作者 Chinmaya Ranjan Pattanaik ELaxmi Lydia Subhi R.M.Zeebaree Sarmad Nozad Mahmood Ali S.Abosinnee Ahmed Alkhayyat 《Computers, Materials & Continua》 SCIE EI 2022年第11期4393-4406,共14页
Histopathology is the investigation of tissues to identify the symptom of abnormality.The histopathological procedure comprises gathering samples of cells/tissues,setting them on the microscopic slides,and staining th... Histopathology is the investigation of tissues to identify the symptom of abnormality.The histopathological procedure comprises gathering samples of cells/tissues,setting them on the microscopic slides,and staining them.The investigation of the histopathological image is a problematic and laborious process that necessitates the expert’s knowledge.At the same time,deep learning(DL)techniques are able to derive features,extract data,and learn advanced abstract data representation.With this view,this paper presents an ensemble of handcrafted with deep learning enabled histopathological image classification(EHCDL-HIC)model.The proposed EHCDLHIC technique initially performs Weiner filtering based noise removal technique.Once the images get smoothened,an ensemble of deep features and local binary pattern(LBP)features are extracted.For the classification process,the bidirectional gated recurrent unit(BGRU)model can be employed.At the final stage,the bacterial foraging optimization(BFO)algorithm is utilized for optimal hyperparameter tuning process which leads to improved classification performance,shows the novelty of the work.For validating the enhanced execution of the proposed EHCDL-HIC method,a set of simulations is performed.The experimentation outcomes highlighted the betterment of the EHCDL-HIC approach over the existing techniques with maximum accuracy of 94.78%.Therefore,the EHCDL-HIC model can be applied as an effective approach for histopathological image classification. 展开更多
关键词 Histopathological image classification machine learning deep learning handcrafted features bacterial foraging optimization
在线阅读 下载PDF
Hybrid Deep Learning Enabled Load Prediction for Energy Storage Systems
8
作者 Firas Abedi Hayder M.A.Ghanimi +8 位作者 Mohammed A.M.Sadeeq Ahmed Alkhayyat Zahraa H.Kareem Sarmad Nozad Mahmood Ali Hashim Abbas Ali S.Abosinnee Waleed Khaild Al-Azzawi Mustafa Musa Jaber Mohammed Dauwed 《Computers, Materials & Continua》 SCIE EI 2023年第5期3359-3374,共16页
Recent economic growth and development have considerably raised energy consumption over the globe.Electric load prediction approaches become essential for effective planning,decision-making,and contract evaluation of ... Recent economic growth and development have considerably raised energy consumption over the globe.Electric load prediction approaches become essential for effective planning,decision-making,and contract evaluation of the power systems.In order to achieve effective forecasting outcomes with minimumcomputation time,this study develops an improved whale optimization with deep learning enabled load prediction(IWO-DLELP)scheme for energy storage systems(ESS)in smart grid platform.The major intention of the IWO-DLELP technique is to effectually forecast the electric load in SG environment for designing proficient ESS.The proposed IWO-DLELP model initially undergoes pre-processing in two stages namely min-max normalization and feature selection.Besides,partition clustering approach is applied for the decomposition of data into distinct clusters with respect to distance and objective functions.Moreover,IWO with bidirectional gated recurrent unit(BiGRU)model is applied for the prediction of load and the hyperparameters are tuned by the use of IWO algorithm.The experiment analysis reported the enhanced results of the IWO-DLELP model over the recent methods interms of distinct evaluation measures. 展开更多
关键词 Load forecasting smart grid energy storage system electricity load forecasting artificial intelligence CLUSTERING
在线阅读 下载PDF
Severity Based Light-Weight Encryption Model for Secure Medical Information System
9
作者 Firas Abedi Subhi R.M.Zeebaree +10 位作者 Zainab Salih Ageed Hayder M.A.Ghanimi Ahmed Alkhayyat Mohammed A.M.Sadeeq Sarmad Nozad Mahmood Ali S.Abosinnee Zahraa H.Kareem Ali Hashim Abbas Waleed Khaild Al-Azzawi Mustafa Musa Jaber Mohammed Dauwed 《Computers, Materials & Continua》 SCIE EI 2023年第3期5691-5704,共14页
As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts o... As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts of multimedia and medical pictures being exchanged,low computational complexity techniques have been developed.Most commonly used algorithms offer very little security and require a great deal of communication,all of which add to the high processing costs associated with using them.First,a deep learning classifier is used to classify records according to the degree of concealment they require.Medical images that aren’t needed can be saved by using this method,which cuts down on security costs.Encryption is one of the most effective methods for protecting medical images after this step.Confusion and dispersion are two fundamental encryption processes.A new encryption algorithm for very sensitive data is developed in this study.Picture splitting with image blocks is nowdeveloped by using Zigzag patterns,rotation of the image blocks,and random permutation for scrambling the blocks.After that,this research suggests a Region of Interest(ROI)technique based on selective picture encryption.For the first step,we use an active contour picture segmentation to separate the ROI from the Region of Background(ROB).Permutation and diffusion are then carried out using a Hilbert curve and a Skew Tent map.Once all of the blocks have been encrypted,they are combined to create encrypted images.The investigational analysis is carried out to test the competence of the projected ideal with existing techniques. 展开更多
关键词 Deep learning ENCRYPTION medical images SCRAMBLING security skew tent map rotation zigzag pattern
在线阅读 下载PDF
Study of the Isotope Effects of Novel Superconducting LaH<sub>10</sub>-LaD<sub>10</sub>and H<sub>3</sub>S-D<sub>3</sub>S Systems
10
作者 Hassan H. Mohammed 《Journal of High Energy Physics, Gravitation and Cosmology》 2021年第4期1219-1229,共11页
This paper is directed to study the isotope effects of some superconducting materials that have a strong coupling coefficient <i>λ</i> > 1.5, and focuses on new superconducting materials whose critical... This paper is directed to study the isotope effects of some superconducting materials that have a strong coupling coefficient <i>λ</i> > 1.5, and focuses on new superconducting materials whose critical temperature is close to room temperature, specifically LaH<sub>10</sub>-LaD<sub>10</sub> and H<sub>3</sub>S-D<sub>3</sub>S systems. The Eliashberg-McMillan (EM) model and the recent Gor’kov-Kresin (GK) model for evaluating the isotope effects coefficient α were examined for these systems. The predicted values of α as a function of pressure, as compared to experimental values led to inference that these two models, despite their importance and simplicity, cannot be considered complete. These models can be used to calculate isotope effect of most superconducting materials with strong coupling coefficients but with critical reliability. The significance of studying the isotope effect lies in the possibility of identifying the interatomic forces that control the properties of superconducting materials such as electrons-mediated phonons and Coulomb interactions. 展开更多
关键词 Isotope Effects SUPERCONDUCTIVITY Strong Coupling Coefficient High Pressure
在线阅读 下载PDF
Research on Trust Prediction from a Sociological Perspective 被引量:1
11
作者 王英 王鑫 左万利 《Journal of Computer Science & Technology》 SCIE EI CSCD 2015年第4期843-858,共16页
Trust, as a major part of human interactions, plays an important role in helping users collect reliable infor-mation and make decisions. However, in reality, user-specified trust relations are often very sparse and fo... Trust, as a major part of human interactions, plays an important role in helping users collect reliable infor-mation and make decisions. However, in reality, user-specified trust relations are often very sparse and follow a power law distribution; hence inferring unknown trust relations attracts increasing attention in recent years. Social theories are frameworks of empirical evidence used to study and interpret social phenomena from a sociological perspective, while social networks reflect the correlations of users in real world; hence, making the principle, rules, ideas and methods of social theories into the analysis of social networks brings new opportunities for trust prediction. In this paper, we investigate how to exploit homophily and social status in trust prediction by modeling social theories. We first give several methods to compute homophily coe?cient and status coe?cient, then provide a principled way to model trust prediction mathe-matically, and propose a novel framework, hsTrust, which incorporates homophily theory and status theory. Experimental results on real-world datasets demonstrate the effectiveness of the proposed framework. Further experiments are conducted to understand the importance of homophily theory and status theory in trust prediction. 展开更多
关键词 trust prediction homophily coefficient status coefficient social theory matrix factorization
原文传递
Building trust networks in the absence of trust relations 被引量:2
12
作者 Xin WANG Ying WANG Jian-hua GUO 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第10期1591-1600,共10页
User-specified trust relations are often very sparse and dynamic, making them difficult to accurately predict from online social media. In addition, trust relations are usually unavailable for most social media platfo... User-specified trust relations are often very sparse and dynamic, making them difficult to accurately predict from online social media. In addition, trust relations are usually unavailable for most social media platforms.These issues pose a great challenge for predicting trust relations and further building trust networks. In this study,we investigate whether we can predict trust relations via a sparse learning model, and propose to build a trust network without trust relations using only pervasively available interaction data and homophily effect in an online world. In particular, we analyze the reliability of predicting trust relations by interaction behaviors, and provide a principled way to mathematically incorporate interaction behaviors and homophily effect in a novel framework,b Trust. Results of experiments on real-world datasets from Epinions and Ciao demonstrated the effectiveness of the proposed framework. Further experiments were conducted to understand the importance of interaction behaviors and homophily effect in building trust networks. 展开更多
关键词 Trust network Sparse learning Homophily effect Interaction behaviors
原文传递
A novel multi-stable sinusoidal chaotic map with spectacular behaviors
13
作者 Ahmed M Ali Ali Sridevi Sriram +3 位作者 Hayder Natiq Atefeh Ahmadi Karthikeyan Rajagopal Sajad Jafari 《Communications in Theoretical Physics》 SCIE CAS CSCD 2023年第11期3-14,共12页
Chaotic behavior can be observed in continuous and discrete-time systems.This behavior can appear in one-dimensional nonlinear maps;however,having at least three state variables in flows is necessary.Due to the lower ... Chaotic behavior can be observed in continuous and discrete-time systems.This behavior can appear in one-dimensional nonlinear maps;however,having at least three state variables in flows is necessary.Due to the lower mathematical complexity and computational cost of maps,lots of research has been conducted based on them.This paper aims to present a novel one-dimensional trigonometric chaotic map that is multi-stable and can act attractively.The proposed chaotic map is first analyzed using a single sinusoidal function;then,its abilities are expanded to a map with a combination of two sinusoidal functions.The stability conditions of both maps are investigated,and their different behaviors are validated through time series,state space,and cobweb diagrams.Eventually,the influence of parameter variations on the maps’outputs is examined by one-dimensional and two-dimensional bifurcation diagrams and Lyapunov exponent spectra.Besides,the diversity of outputs with varying initial conditions reveals this map’s multi-stability.The newly designed chaotic map can be employed in encryption applications. 展开更多
关键词 chaotic map discrete chaos sinusoidal map multi-stability dynamical analysis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部