期刊文献+
共找到1,115篇文章
< 1 2 56 >
每页显示 20 50 100
An Effective and Secure Quality Assurance System for a Computer Science Program 被引量:1
1
作者 Mohammad Alkhatib 《Computer Systems Science & Engineering》 SCIE EI 2022年第6期975-995,共21页
Improving the quality assurance (QA) processes and acquiring accreditation are top priorities for academic programs. The learning outcomes (LOs)assessment and continuous quality improvement represent core components o... Improving the quality assurance (QA) processes and acquiring accreditation are top priorities for academic programs. The learning outcomes (LOs)assessment and continuous quality improvement represent core components ofthe quality assurance system (QAS). Current assessment methods suffer deficiencies related to accuracy and reliability, and they lack well-organized processes forcontinuous improvement planning. Moreover, the absence of automation, andintegration in QA processes forms a major obstacle towards developing efficientquality system. There is a pressing need to adopt security protocols that providerequired security services to safeguard the valuable information processed byQAS as well. This research proposes an effective methodology for LOs assessment and continuous improvement processes. The proposed approach ensuresmore accurate and reliable LOs assessment results and provides systematic wayfor utilizing those results in the continuous quality improvement. This systematicand well-specified QA processes were then utilized to model and implement automated and secure QAS that efficiently performs quality-related processes. Theproposed system adopts two security protocols that provide confidentiality, integrity, and authentication for quality data and reports. The security protocols avoidthe source repudiation, which is important in the quality reporting system. This isachieved through implementing powerful cryptographic algorithms. The QASenables efficient data collection and processing required for analysis and interpretation. It also prepares for the development of datasets that can be used in futureartificial intelligence (AI) researches to support decision making and improve thequality of academic programs. The proposed approach is implemented in a successful real case study for a computer science program. The current study servesscientific programs struggling to achieve academic accreditation, and gives rise tofully automating and integrating the QA processes and adopting modern AI andsecurity technologies to develop effective QAS. 展开更多
关键词 Quality assurance information security cryptographic algorithms education programs
在线阅读 下载PDF
Attention Eraser and Quantitative Measures for Automated Bone Age Assessment
2
作者 Liuqiang Shu Lei Yu 《Computers, Materials & Continua》 SCIE EI 2025年第1期627-644,共18页
Bone age assessment(BAA)aims to determine whether a child’s growth and development are normal concerning their chronological age.To predict bone age more accurately based on radiographs,and for the left-hand X-ray im... Bone age assessment(BAA)aims to determine whether a child’s growth and development are normal concerning their chronological age.To predict bone age more accurately based on radiographs,and for the left-hand X-ray images of different races model can have better adaptability,we propose a neural network in parallel with the quantitative features from the left-hand bone measurements for BAA.In this study,a lightweight feature extractor(LFE)is designed to obtain the featuremaps fromradiographs,and amodule called attention erasermodule(AEM)is proposed to capture the fine-grained features.Meanwhile,the dimensional information of the metacarpal parts in the radiographs is measured to enhance the model’s generalization capability across images fromdifferent races.Ourmodel is trained and validated on the RSNA,RHPE,and digital hand atlas datasets,which include images from various racial groups.The model achieves a mean absolute error(MAE)of 4.42 months on the RSNA dataset and 15.98 months on the RHPE dataset.Compared to ResNet50,InceptionV3,and several state-of-the-art methods,our proposed method shows statistically significant improvements(p<0.05),with a reduction in MAE by 0.2±0.02 years across different racial datasets.Furthermore,t-tests on the features also confirm the statistical significance of our approach(p<0.05). 展开更多
关键词 Bone age assessment attention eraser quantitative feature metacarpal bones
在线阅读 下载PDF
Improving the Position Accuracy and Computational Efficiency of UAV Terrain Aided Navigation Using a Two-Stage Hybrid Fuzzy Particle Filtering Method
3
作者 Sofia Yousuf Muhammad Bilal Kadri 《Computers, Materials & Continua》 SCIE EI 2025年第1期1193-1210,共18页
Terrain Aided Navigation(TAN)technology has become increasingly important due to its effectiveness in environments where Global Positioning System(GPS)is unavailable.In recent years,TAN systems have been extensively r... Terrain Aided Navigation(TAN)technology has become increasingly important due to its effectiveness in environments where Global Positioning System(GPS)is unavailable.In recent years,TAN systems have been extensively researched for both aerial and underwater navigation applications.However,many TAN systems that rely on recursive Unmanned Aerial Vehicle(UAV)position estimation methods,such as Extended Kalman Filters(EKF),often face challenges with divergence and instability,particularly in highly non-linear systems.To address these issues,this paper proposes and investigates a hybrid two-stage TAN positioning system for UAVs that utilizes Particle Filter.To enhance the system’s robustness against uncertainties caused by noise and to estimate additional system states,a Fuzzy Particle Filter(FPF)is employed in the first stage.This approach introduces a novel terrain composite feature that enables a fuzzy expert system to analyze terrain non-linearities and dynamically adjust the number of particles in real-time.This design allows the UAV to be efficiently localized in GPS-denied environments while also reducing the computational complexity of the particle filter in real-time applications.In the second stage,an Error State Kalman Filter(ESKF)is implemented to estimate the UAV’s altitude.The ESKF is chosen over the conventional EKF method because it is more suitable for non-linear systems.Simulation results demonstrate that the proposed fuzzy-based terrain composite method achieves high positional accuracy while reducing computational time and memory usage. 展开更多
关键词 Sensor fusion fuzzy logic particle filter composite feature terrain aided navigation
在线阅读 下载PDF
Design and Application of“STEM+”6E Teaching Mode in Information Technology Teaching
4
作者 Yu Zhang Xiaohong Lan +1 位作者 Yaqing Lu Ying Deng 《Journal of Contemporary Educational Research》 2024年第9期92-99,共8页
The concept of“STEM+”integrates art,humanistic literacy,and social values in the traditional STEM education concept,advocates cross-disciplinary integration,and aims to cultivate compound talents equipped to tackle ... The concept of“STEM+”integrates art,humanistic literacy,and social values in the traditional STEM education concept,advocates cross-disciplinary integration,and aims to cultivate compound talents equipped to tackle future challenges.In 2022,the Ministry of Education issued the“Compulsory Education Information Technology Curriculum(2022 Edition),”emphasizing the core literacy of information science and technology and the integration of interdisciplinary disciplines,and encouraging the teaching mode suitable for discipline characteristics.The 6E teaching mode is a student-centered teaching strategy characterized by active exploration and cross-disciplinary integration.This article innovatively designed the“STEM+”6E teaching mode,which is applied to junior high school information technology teaching,which can better achieve core literacy teaching goals. 展开更多
关键词 STEM+ 6E teaching mode Information technology APPLICATION
在线阅读 下载PDF
Enhancing User Experience in AI-Powered Human-Computer Communication with Vocal Emotions Identification Using a Novel Deep Learning Method
5
作者 Ahmed Alhussen Arshiya Sajid Ansari Mohammad Sajid Mohammadi 《Computers, Materials & Continua》 2025年第2期2909-2929,共21页
Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing de... Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing details about the speaker’s goals and desires, as well as their internal condition. Certain vocal characteristics reveal the speaker’s mood, intention, and motivation, while word study assists the speaker’s demand to be understood. Voice emotion recognition has become an essential component of modern HCC networks. Integrating findings from the various disciplines involved in identifying vocal emotions is also challenging. Many sound analysis techniques were developed in the past. Learning about the development of artificial intelligence (AI), and especially Deep Learning (DL) technology, research incorporating real data is becoming increasingly common these days. Thus, this research presents a novel selfish herd optimization-tuned long/short-term memory (SHO-LSTM) strategy to identify vocal emotions in human communication. The RAVDESS public dataset is used to train the suggested SHO-LSTM technique. Mel-frequency cepstral coefficient (MFCC) and wiener filter (WF) techniques are used, respectively, to remove noise and extract features from the data. LSTM and SHO are applied to the extracted data to optimize the LSTM network’s parameters for effective emotion recognition. Python Software was used to execute our proposed framework. In the finding assessment phase, Numerous metrics are used to evaluate the proposed model’s detection capability, Such as F1-score (95%), precision (95%), recall (96%), and accuracy (97%). The suggested approach is tested on a Python platform, and the SHO-LSTM’s outcomes are contrasted with those of other previously conducted research. Based on comparative assessments, our suggested approach outperforms the current approaches in vocal emotion recognition. 展开更多
关键词 Human-computer communication(HCC) vocal emotions live vocal artificial intelligence(AI) deep learning(DL) selfish herd optimization-tuned long/short K term memory(SHO-LSTM)
在线阅读 下载PDF
Zero Trust Networks: Evolution and Application from Concept to Practice
6
作者 Yongjun Ren Zhiming Wang +3 位作者 Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang 《Computers, Materials & Continua》 2025年第2期1593-1613,共21页
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized technology.Zero Trust not ... In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized technology.Zero Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network environments.This paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key technologies.Additionally,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use cases.The paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions. 展开更多
关键词 Zero trust CYBERSECURITY software-defined perimeter micro-segmentation internet of things
在线阅读 下载PDF
Enhancement of Information Transmission by Array Induced Stochastic Resonance in the Processes of Amplitude and Frequency Modulations 被引量:1
7
作者 吴礼燕 刘宗华 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第5期1110-1113,共4页
Information transmission is studied in the cases of amplitude and frequency modulations where there is an impulsive jamming in the signal. By using the array approach of nonlinear elements, we find that for both the p... Information transmission is studied in the cases of amplitude and frequency modulations where there is an impulsive jamming in the signal. By using the array approach of nonlinear elements, we find that for both the periodic and aperiodic modulations, the information transmission can be enhanced by adding independent external noise on every element of the array. The dependence of information transmission on the size of array and the impulsive interval of the jamming are also studied. 展开更多
关键词 NOISY SIGNALS SYSTEMS DRIVEN
在线阅读 下载PDF
Computer Vision and Deep Learning-enabled Weed Detection Model for Precision Agriculture 被引量:1
8
作者 R.Punithavathi A.Delphin Carolina Rani +4 位作者 K.R.Sughashinir Chinnarao Kurangit M.Nirmala Hasmath Farhana Thariq Ahmed S.P.Balamurugan 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2759-2774,共16页
Presently,precision agriculture processes like plant disease,crop yield prediction,species recognition,weed detection,and irrigation can be accom-plished by the use of computer vision(CV)approaches.Weed plays a vital ... Presently,precision agriculture processes like plant disease,crop yield prediction,species recognition,weed detection,and irrigation can be accom-plished by the use of computer vision(CV)approaches.Weed plays a vital role in influencing crop productivity.The wastage and pollution of farmland's natural atmosphere instigated by full coverage chemical herbicide spraying are increased.Since the proper identification of weeds from crops helps to reduce the usage of herbicide and improve productivity,this study presents a novel computer vision and deep learning based weed detection and classification(CVDL-WDC)model for precision agriculture.The proposed CVDL-WDC technique intends to prop-erly discriminate the plants as well as weeds.The proposed CVDL-WDC technique involves two processes namely multiscale Faster RCNN based object detection and optimal extreme learning machine(ELM)based weed classification.The parameters of the ELM model are optimally adjusted by the use of farmland fertility optimization(FFO)algorithm.A comprehensive simulation analysis of the CVDL-WDC technique against benchmark dataset reported the enhanced out-comes over its recent approaches interms of several measures. 展开更多
关键词 Precision agriculture smart farming weed detection computer vision deep learning
在线阅读 下载PDF
Spatio-temporal Evolution Characteristics and Driving Forces of Winter Urban Heat Island:A Case Study of Rapid Urbanization Area of Fuzhou City,China 被引量:2
9
作者 WANG Zili LU Chunyan +4 位作者 SU Yanlin SU Yue YU Qianru LI Wenzhe YANG Nuocheng 《Chinese Geographical Science》 SCIE CSCD 2024年第1期135-148,共14页
Under the influence of anthropogenic and climate change,the problems caused by urban heat island(UHI)has become increasingly prominent.In order to promote urban sustainable development and improve the quality of human... Under the influence of anthropogenic and climate change,the problems caused by urban heat island(UHI)has become increasingly prominent.In order to promote urban sustainable development and improve the quality of human settlements,it is significant for exploring the evolution characteristics of urban thermal environment and analyzing its driving forces.Taking the Landsat series images as the basic data sources,the winter land surface temperature(LST)of the rapid urbanization area of Fuzhou City in China was quantitatively retrieved from 2001 to 2021.Combing comprehensively the standard deviation ellipse model,profile analysis and GeoDetector model,the spatio-temporal evolution characteristics and influencing factors of the winter urban thermal environment were systematically analyzed.The results showed that the winter LST presented an increasing trend in the study area during 2001–2021,and the winter LST of the central urban regions was significantly higher than the suburbs.There was a strong UHI effect from 2001 to 2021with an expansion trend from the central urban regions to the suburbs and coastal areas in space scale.The LST of green lands and wetlands are significantly lower than croplands,artificial surface and unvegetated lands.Vegetation and water bodies had a significant mitigation effect on UHI,especially in the micro-scale.The winter UHI had been jointly driven by the underlying surface and socio-economic factors in a nonlinear or two-factor interactive enhancement mode,and socio-economic factors had played a leading role.This research could provide data support and decision-making references for rationally planning urban layout and promoting sustainable urban development. 展开更多
关键词 winter urban heat island(UHI) rapid urbanization area land surface temperature(LST)retrieval profile analysis GeoDetector model Fuzhou City China
在线阅读 下载PDF
Smart Healthcare Activity Recognition Using Statistical Regression and Intelligent Learning 被引量:1
10
作者 K.Akilandeswari Nithya Rekha Sivakumar +2 位作者 Hend Khalid Alkahtani Shakila Basheer Sara Abdelwahab Ghorashi 《Computers, Materials & Continua》 SCIE EI 2024年第1期1189-1205,共17页
In this present time,Human Activity Recognition(HAR)has been of considerable aid in the case of health monitoring and recovery.The exploitation of machine learning with an intelligent agent in the area of health infor... In this present time,Human Activity Recognition(HAR)has been of considerable aid in the case of health monitoring and recovery.The exploitation of machine learning with an intelligent agent in the area of health informatics gathered using HAR augments the decision-making quality and significance.Although many research works conducted on Smart Healthcare Monitoring,there remain a certain number of pitfalls such as time,overhead,and falsification involved during analysis.Therefore,this paper proposes a Statistical Partial Regression and Support Vector Intelligent Agent Learning(SPR-SVIAL)for Smart Healthcare Monitoring.At first,the Statistical Partial Regression Feature Extraction model is used for data preprocessing along with the dimensionality-reduced features extraction process.Here,the input dataset the continuous beat-to-beat heart data,triaxial accelerometer data,and psychological characteristics were acquired from IoT wearable devices.To attain highly accurate Smart Healthcare Monitoring with less time,Partial Least Square helps extract the dimensionality-reduced features.After that,with these resulting features,SVIAL is proposed for Smart Healthcare Monitoring with the help of Machine Learning and Intelligent Agents to minimize both analysis falsification and overhead.Experimental evaluation is carried out for factors such as time,overhead,and false positive rate accuracy concerning several instances.The quantitatively analyzed results indicate the better performance of our proposed SPR-SVIAL method when compared with two state-of-the-art methods. 展开更多
关键词 Internet of Things smart health care monitoring human activity recognition intelligent agent learning statistical partial regression support vector
在线阅读 下载PDF
Road Traffic Monitoring from Aerial Images Using Template Matching and Invariant Features 被引量:1
11
作者 Asifa Mehmood Qureshi Naif Al Mudawi +2 位作者 Mohammed Alonazi Samia Allaoua Chelloug Jeongmin Park 《Computers, Materials & Continua》 SCIE EI 2024年第3期3683-3701,共19页
Road traffic monitoring is an imperative topic widely discussed among researchers.Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides.However,aerial images provide the flexibilit... Road traffic monitoring is an imperative topic widely discussed among researchers.Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides.However,aerial images provide the flexibility to use mobile platforms to detect the location and motion of the vehicle over a larger area.To this end,different models have shown the ability to recognize and track vehicles.However,these methods are not mature enough to produce accurate results in complex road scenes.Therefore,this paper presents an algorithm that combines state-of-the-art techniques for identifying and tracking vehicles in conjunction with image bursts.The extracted frames were converted to grayscale,followed by the application of a georeferencing algorithm to embed coordinate information into the images.The masking technique eliminated irrelevant data and reduced the computational cost of the overall monitoring system.Next,Sobel edge detection combined with Canny edge detection and Hough line transform has been applied for noise reduction.After preprocessing,the blob detection algorithm helped detect the vehicles.Vehicles of varying sizes have been detected by implementing a dynamic thresholding scheme.Detection was done on the first image of every burst.Then,to track vehicles,the model of each vehicle was made to find its matches in the succeeding images using the template matching algorithm.To further improve the tracking accuracy by incorporating motion information,Scale Invariant Feature Transform(SIFT)features have been used to find the best possible match among multiple matches.An accuracy rate of 87%for detection and 80%accuracy for tracking in the A1 Motorway Netherland dataset has been achieved.For the Vehicle Aerial Imaging from Drone(VAID)dataset,an accuracy rate of 86%for detection and 78%accuracy for tracking has been achieved. 展开更多
关键词 Unmanned Aerial Vehicles(UAV) aerial images DATASET object detection object tracking data elimination template matching blob detection SIFT VAID
在线阅读 下载PDF
An Analysis Model of Learners’ Online Learning Status Based on Deep Neural Network and Multi-Dimensional Information Fusion
12
作者 Mingyong Li Lirong Tang +3 位作者 Longfei Ma Honggang Zhao Jinyu Hu Yan Wei 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第6期2349-2371,共23页
The learning status of learners directly affects the quality of learning.Compared with offline teachers,it is difficult for online teachers to capture the learning status of students in the whole class,and it is even ... The learning status of learners directly affects the quality of learning.Compared with offline teachers,it is difficult for online teachers to capture the learning status of students in the whole class,and it is even more difficult to continue to pay attention to studentswhile teaching.Therefore,this paper proposes an online learning state analysis model based on a convolutional neural network and multi-dimensional information fusion.Specifically,a facial expression recognition model and an eye state recognition model are constructed to detect students’emotions and fatigue,respectively.By integrating the detected data with the homework test score data after online learning,an analysis model of students’online learning status is constructed.According to the PAD model,the learning state is expressed as three dimensions of students’understanding,engagement and interest,and then analyzed from multiple perspectives.Finally,the proposed model is applied to actual teaching,and procedural analysis of 5 different types of online classroom learners is carried out,and the validity of the model is verified by comparing with the results of the manual analysis. 展开更多
关键词 Deep learning fatigue detection facial expression recognition sentiment analysis information fusion
在线阅读 下载PDF
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques 被引量:1
13
作者 Nasser Alshammari Shumaila Shahzadi +7 位作者 Saad Awadh Alanazi Shahid Naseem Muhammad Anwar Madallah Alruwaili Muhammad Rizwan Abid Omar Alruwaili Ahmed Alsayat Fahad Ahmad 《Computer Systems Science & Engineering》 2024年第2期363-394,共32页
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne... Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment. 展开更多
关键词 Software defined network network function virtualization network function virtualization management and orchestration virtual infrastructure manager virtual network function Kubernetes Kubectl artificial intelligence machine learning
在线阅读 下载PDF
An Implementation of Multiscale Line Detection and Mathematical Morphology for Efficient and Precise Blood Vessel Segmentation in Fundus Images 被引量:1
14
作者 Syed Ayaz Ali Shah Aamir Shahzad +4 位作者 Musaed Alhussein Chuan Meng Goh Khursheed Aurangzeb Tong Boon Tang Muhammad Awais 《Computers, Materials & Continua》 SCIE EI 2024年第5期2565-2583,共19页
Diagnosing various diseases such as glaucoma,age-related macular degeneration,cardiovascular conditions,and diabetic retinopathy involves segmenting retinal blood vessels.The task is particularly challenging when deal... Diagnosing various diseases such as glaucoma,age-related macular degeneration,cardiovascular conditions,and diabetic retinopathy involves segmenting retinal blood vessels.The task is particularly challenging when dealing with color fundus images due to issues like non-uniformillumination,low contrast,and variations in vessel appearance,especially in the presence of different pathologies.Furthermore,the speed of the retinal vessel segmentation system is of utmost importance.With the surge of now available big data,the speed of the algorithm becomes increasingly important,carrying almost equivalent weightage to the accuracy of the algorithm.To address these challenges,we present a novel approach for retinal vessel segmentation,leveraging efficient and robust techniques based on multiscale line detection and mathematical morphology.Our algorithm’s performance is evaluated on two publicly available datasets,namely the Digital Retinal Images for Vessel Extraction dataset(DRIVE)and the Structure Analysis of Retina(STARE)dataset.The experimental results demonstrate the effectiveness of our method,withmean accuracy values of 0.9467 forDRIVE and 0.9535 for STARE datasets,aswell as sensitivity values of 0.6952 forDRIVE and 0.6809 for STARE datasets.Notably,our algorithmexhibits competitive performance with state-of-the-art methods.Importantly,it operates at an average speed of 3.73 s per image for DRIVE and 3.75 s for STARE datasets.It is worth noting that these results were achieved using Matlab scripts containing multiple loops.This suggests that the processing time can be further reduced by replacing loops with vectorization.Thus the proposed algorithm can be deployed in real time applications.In summary,our proposed system strikes a fine balance between swift computation and accuracy that is on par with the best available methods in the field. 展开更多
关键词 Line detector vessel detection LOCALIZATION mathematical morphology image processing
在线阅读 下载PDF
Computer Forensics Framework for Efficient and Lawful Privacy-Preserved Investigation
15
作者 Waleed Halboob Jalal Almuhtadi 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期2071-2092,共22页
Privacy preservation(PP)in Digital forensics(DF)is a conflicted and non-trivial issue.Existing solutions use the searchable encryption concept and,as a result,are not efficient and support only a keyword search.Moreov... Privacy preservation(PP)in Digital forensics(DF)is a conflicted and non-trivial issue.Existing solutions use the searchable encryption concept and,as a result,are not efficient and support only a keyword search.Moreover,the collected forensic data cannot be analyzed using existing well-known digital tools.This research paper first investigates the lawful requirements for PP in DF based on the organization for economic co-operation and development OECB)privacy guidelines.To have an efficient investigation process and meet the increased volume of data,the presented framework is designed based on the selective imaging concept and advanced encryption standard(AES).The proposed framework has two main modules,namely Selective Imaging Module(SIM)and Selective Analysis Module(SAM).The SIM and SAM modules are implemented based on advanced forensic format 4(AFF4)and SleuthKit open source forensics frameworks,respectively,and,accordingly,the proposed framework is evaluated in a forensically sound manner.The evaluation result is compared with other relevant works and,as a result,the proposed solution provides a privacy-preserving,efficient forensic imaging and analysis process while having also sufficient methods.Moreover,the AFF4 forensic image,produced by the SIM module,can be analyzed not only by SAM,but also by other well-known analysis tools available on the market. 展开更多
关键词 Digital forensics digital evidence AFF4 privacy preservation selective imaging
在线阅读 下载PDF
A deep convolutional neural network for diabetic retinopathy detection via mining local and long-range dependence 被引量:1
16
作者 Xiaoling Luo Wei Wang +4 位作者 Yong Xu Zhihui Lai Xiaopeng Jin Bob Zhang David Zhang 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第1期153-166,共14页
Diabetic retinopathy(DR),the main cause of irreversible blindness,is one of the most common complications of diabetes.At present,deep convolutional neural networks have achieved promising performance in automatic DR d... Diabetic retinopathy(DR),the main cause of irreversible blindness,is one of the most common complications of diabetes.At present,deep convolutional neural networks have achieved promising performance in automatic DR detection tasks.The convolution operation of methods is a local cross-correlation operation,whose receptive field de-termines the size of the local neighbourhood for processing.However,for retinal fundus photographs,there is not only the local information but also long-distance dependence between the lesion features(e.g.hemorrhages and exudates)scattered throughout the whole image.The proposed method incorporates correlations between long-range patches into the deep learning framework to improve DR detection.Patch-wise re-lationships are used to enhance the local patch features since lesions of DR usually appear as plaques.The Long-Range unit in the proposed network with a residual structure can be flexibly embedded into other trained networks.Extensive experimental results demon-strate that the proposed approach can achieve higher accuracy than existing state-of-the-art models on Messidor and EyePACS datasets. 展开更多
关键词 image classification medical image processing pattern recognition
在线阅读 下载PDF
Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology 被引量:1
17
作者 Nazik Alturki Raed Alharthi +5 位作者 Muhammad Umer Oumaima Saidani Amal Alshardan Reemah M.Alhebshi Shtwai Alsubai Ali Kashif Bashir 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3387-3415,共29页
The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the d... The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device itself.Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features.This paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in homes.We have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT devices.Our system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing devices.We have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache server.The feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time settings.It is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation systems.Additionally,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber threats.The trial results support the proposed system and demonstrate its potential for use in everyday life. 展开更多
关键词 Blockchain Internet of Things(IoT) smart home automation CYBERSECURITY
在线阅读 下载PDF
Privacy-Preserving Information Fusion Technique for Device to Server-Enabled Communication in the Internet of Things:A Hybrid Approach 被引量:1
18
作者 Amal Al-Rasheed Rahim Khan +3 位作者 Tahani Alsaed Mahwish Kundi Mohamad Hanif Md.Saad Mahidur R.Sarker 《Computers, Materials & Continua》 SCIE EI 2024年第7期1305-1323,共19页
Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both cus... Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both customers,i.e.,people,and industries as wearable devices collect sensitive information about patients(both admitted and outdoor)in smart healthcare infrastructures.In addition to privacy,outliers or noise are among the crucial issues,which are directly correlated with IoT infrastructures,as most member devices are resource-limited and could generate or transmit false data that is required to be refined before processing,i.e.,transmitting.Therefore,the development of privacy-preserving information fusion techniques is highly encouraged,especially those designed for smart IoT-enabled domains.In this paper,we are going to present an effective hybrid approach that can refine raw data values captured by the respectivemember device before transmission while preserving its privacy through the utilization of the differential privacy technique in IoT infrastructures.Sliding window,i.e.,δi based dynamic programming methodology,is implemented at the device level to ensure precise and accurate detection of outliers or noisy data,and refine it prior to activation of the respective transmission activity.Additionally,an appropriate privacy budget has been selected,which is enough to ensure the privacy of every individualmodule,i.e.,a wearable device such as a smartwatch attached to the patient’s body.In contrast,the end module,i.e.,the server in this case,can extract important information with approximately the maximum level of accuracy.Moreover,refined data has been processed by adding an appropriate nose through the Laplace mechanism to make it useless or meaningless for the adversary modules in the IoT.The proposed hybrid approach is trusted from both the device’s privacy and the integrity of the transmitted information perspectives.Simulation and analytical results have proved that the proposed privacy-preserving information fusion technique for wearable devices is an ideal solution for resource-constrained infrastructures such as IoT and the Internet ofMedical Things,where both device privacy and information integrity are important.Finally,the proposed hybrid approach is proven against well-known intruder attacks,especially those related to the privacy of the respective device in IoT infrastructures. 展开更多
关键词 Internet of things information fusion differential privacy dynamic programming Laplace function
在线阅读 下载PDF
Exploiting Human Pose and Scene Information for Interaction Detection
19
作者 Manahil Waheed Samia Allaoua Chelloug +4 位作者 Mohammad Shorfuzzaman Abdulmajeed Alsufyani Ahmad Jalal Khaled Alnowaiser Jeongmin Park 《Computers, Materials & Continua》 SCIE EI 2023年第3期5853-5870,共18页
Identifying human actions and interactions finds its use in manyareas, such as security, surveillance, assisted living, patient monitoring, rehabilitation,sports, and e-learning. This wide range of applications has at... Identifying human actions and interactions finds its use in manyareas, such as security, surveillance, assisted living, patient monitoring, rehabilitation,sports, and e-learning. This wide range of applications has attractedmany researchers to this field. Inspired by the existing recognition systems,this paper proposes a new and efficient human-object interaction recognition(HOIR) model which is based on modeling human pose and scene featureinformation. There are different aspects involved in an interaction, includingthe humans, the objects, the various body parts of the human, and the backgroundscene. Themain objectives of this research include critically examiningthe importance of all these elements in determining the interaction, estimatinghuman pose through image foresting transform (IFT), and detecting the performedinteractions based on an optimizedmulti-feature vector. The proposedmethodology has six main phases. The first phase involves preprocessing theimages. During preprocessing stages, the videos are converted into imageframes. Then their contrast is adjusted, and noise is removed. In the secondphase, the human-object pair is detected and extracted from each image frame.The third phase involves the identification of key body parts of the detectedhumans using IFT. The fourth phase relates to three different kinds of featureextraction techniques. Then these features are combined and optimized duringthe fifth phase. The optimized vector is used to classify the interactions in thelast phase. TheMSRDaily Activity 3D dataset has been used to test this modeland to prove its efficiency. The proposed system obtains an average accuracyof 91.7% on this dataset. 展开更多
关键词 Artificial intelligence daily activities human interactions human pose information image foresting transform scene feature information
在线阅读 下载PDF
Fuzzy VIKOR Approach to Evaluate the Information Security Policies and Analyze the Content of Press Agencies in Gulf Countries
20
作者 Amir Mohamed Talib 《Journal of Information Security》 2020年第4期189-200,共12页
A news agency is an organization that gathers news reports and sells them to subscribing news organization, such as newspapers, magazines, radio and television broadcasters. A news agency may also be referred to as a ... A news agency is an organization that gathers news reports and sells them to subscribing news organization, such as newspapers, magazines, radio and television broadcasters. A news agency may also be referred to as a wire service, newswire, or news service. The main purpose of this paper is to evaluate the security policies and analyze the content of five press agencies in gulf countries which are (Kuwait News Agency (KUNA), Emirates News Agency (WAM), Saudi Press Agency (SPA), Bahrain News Agency (BNA), and Oman News Agency (OMA)) by using a fuzzy VIKOR approach where linguistic variables are applied to solve the uncertainties and subjectivities in expert decision making. Fuzzy VIKOR approach is one of the best Multi-Criteria Decision Making (MCDM) techniques working in fuzzy environment. This study benefits security and content analysis experts know which press agency has the mandate and the competence to educate the public on news agencies. Besides, this paper contributes to Gulf agencies in helping them in their resolve to ensure the quality of content information and information security policies over the internet. 展开更多
关键词 Content Analysis Fuzzy VIKOR Approach Gulf Countries Information Security Policy Press Agencies Multi-Criteria Decision Making (MCDM) Online Information Quality
在线阅读 下载PDF
上一页 1 2 56 下一页 到第
使用帮助 返回顶部