34 results on '"Hadjouni, Myriam"'
Search Results
2. Improvising and Enhancing the Patterned Surface Performance of MIMO Antenna Parameters and Emphasizing the Efficiency Using Tampered Miniature Sizes and Layers
- Author
-
Saikumar, Kayam, Ahammad, Shaik Hasane, Vani, K. Suvarna, Anwer, Twana Mohammed Kak, Hadjouni, Myriam, Menzli, Leila Jamel, Rashed, Ahmed Nabih Zaki, and Hossain, Md. Amzad
- Published
- 2023
- Full Text
- View/download PDF
3. COVID-19 detection and analysis from lung CT images using novel channel boosted CNNs
- Author
-
Khan, Saddam Hussain, Iqbal, Javed, Hassnain, Syed Agha, Owais, Muhammad, Mostafa, Samih M., Hadjouni, Myriam, and Mahmoud, Amena
- Published
- 2023
- Full Text
- View/download PDF
4. Pneumothorax prediction using a foraging and hunting based ant colony optimizer assisted support vector machine
- Author
-
Yang, Song, Lou, Lejing, Wang, Wangjia, Li, Jie, Jin, Xiao, Wang, Shijia, Cai, Jihao, Kuang, Fangjun, Liu, Lei, Hadjouni, Myriam, Elmannai, Hela, and Cai, Chang
- Published
- 2023
- Full Text
- View/download PDF
5. Advanced Meta-Heuristic Algorithm Based on Particle Swarm and Al-Biruni Earth Radius Optimization Methods for Oral Cancer Detection
- Author
-
Hadjouni Myriam, Abdelaziz A. Abdelhamid, El-Sayed M. El-Kenawy, Abdelhameed Ibrahim, Marwa Metwally Eid, Mona M. Jamjoom, and Doaa Sami Khafaga
- Subjects
Oral cancer ,particle swarm optimization ,Al-Biruni earth radius algorithm ,deep belief network ,convolutional neural network ,metaheuristic optimization ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Oral cancer is a deadly form of cancerous tumor that is widely spread in low and middle-income countries. An early and affordable oral cancer diagnosis might be achieved by automating the detection of precancerous and malignant lesions in the mouth. There are many research attempts to develop a robust machine-learning model that can detect oral cancer from images. However, these are still lacking high precision in oral cancer detection. Therefore, this work aims to propose a new approach capable of detecting oral cancer in medical images with higher accuracy. In this work, a novel and robust oral cancer detection based on a convolutional neural network (CNN) and optimized deep belief network (DBN). The design parameters of CNN and DBN are optimized using a new optimization algorithm, which is developed as a hybrid of Particle Swarm Optimization (PSO) and Al-Biruni Earth Radius (BER) Optimization algorithms and is denoted by (PSOBER). Using a standard biomedical images dataset available on the Kaggle repository, the proposed approach shows promising results outperforming various competing approaches with an accuracy of 97.35%. In addition, a set of statistical tests, such as One-way analysis-of-variance (ANOVA) and Wilcoxon signed-rank tests, are conducted to prove the significance and stability of the proposed approach. The proposed methodology is solid and efficient, and specialists can adopt it. However, additional research on a larger scale dataset is required to confirm the findings and highlight other oral features that can be utilized for cancer detection.
- Published
- 2023
- Full Text
- View/download PDF
6. Investigation of open educational resources adoption in higher education using Rogers’ diffusion of innovation theory
- Author
-
Menzli, Leila Jamel, Smirani, Lassaad K., Boulahia, Jihane A., and Hadjouni, Myriam
- Published
- 2022
- Full Text
- View/download PDF
7. RETRACTED ARTICLE: Emotion-based music recommendation and classification using machine learning with IoT Framework
- Author
-
Quasim, Mohammad Tabrez, Alkhammash, Eman H., Khan, Mohammad Ayoub, and Hadjouni, Myriam
- Published
- 2021
- Full Text
- View/download PDF
8. Retraction Note: Emotion-based music recommendation and classification using machine learning with IoT Framework
- Author
-
Quasim, Mohammad Tabrez, Alkhammash, Eman H., Khan, Mohammad Ayoub, and Hadjouni, Myriam
- Published
- 2023
- Full Text
- View/download PDF
9. A hybrid late fusion-genetic algorithm approach for enhancing CBIR performance
- Author
-
Mahmoud, Abeer M., Karamti, Hanen, and Hadjouni, Myriam
- Published
- 2020
- Full Text
- View/download PDF
10. Enhancing Fashion Classification with Vision Transformer (ViT) and Developing Recommendation Fashion Systems Using DINOVA2.
- Author
-
Abd Alaziz, Hadeer M., Elmannai, Hela, Saleh, Hager, Hadjouni, Myriam, Anter, Ahmed M., Koura, Abdelrahim, and Kayed, Mohammed
- Subjects
TRANSFORMER models ,VISUAL learning ,CONVOLUTIONAL neural networks ,RECOMMENDER systems ,CLASSIFICATION - Abstract
As e-commerce platforms grow, consumers increasingly purchase clothes online; however, they often need clarification on clothing choices. Consumers and stores interact through the clothing recommendation system. A recommendation system can help customers to find clothing that they are interested in and can improve turnover. This work has two main goals: enhancing fashion classification and developing a fashion recommendation system. The main objective of fashion classification is to apply a Vision Transformer (ViT) to enhance performance. ViT is a set of transformer blocks; each transformer block consists of two layers: a multi-head self-attention layer and a multilayer perceptron (MLP) layer. The hyperparameters of ViT are configured based on the fashion images dataset. CNN models have different layers, including multi-convolutional layers, multi-max pooling layers, multi-dropout layers, multi-fully connected layers, and batch normalization layers. Furthermore, ViT is compared with different models, i.e., deep CNN models, VGG16, DenseNet-121, Mobilenet, and ResNet50, using different evaluation methods and two fashion image datasets. The ViT model performs the best on the Fashion-MNIST dataset (accuracy = 95.25, precision = 95.20, recall = 95.25, F1-score = 95.20). ViT records the highest performance compared to other models in the fashion product dataset (accuracy = 98.53, precision = 98.42, recall = 98.53, F1-score = 98.46). A recommendation fashion system is developed using Learning Robust Visual Features without Supervision (DINOv2) and a nearest neighbor search that is built in the FAISS library to obtain the top five similarity results for specific images. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
11. Application of Machine Learning to Predict COVID-19 Spread via an Optimized BPSO Model.
- Author
-
Alkhammash, Eman H., Assiri, Sara Ahmad, Nemenqani, Dalal M., Althaqafi, Raad M. M., Hadjouni, Myriam, Saeed, Faisal, and Elshewey, Ahmed M.
- Subjects
COVID-19 pandemic ,MACHINE learning ,PARTICLE swarm optimization ,RECEIVER operating characteristic curves ,RANDOM forest algorithms ,BOOSTING algorithms - Abstract
During the pandemic of the coronavirus disease (COVID-19), statistics showed that the number of affected cases differed from one country to another and also from one city to another. Therefore, in this paper, we provide an enhanced model for predicting COVID-19 samples in different regions of Saudi Arabia (high-altitude and sea-level areas). The model is developed using several stages and was successfully trained and tested using two datasets that were collected from Taif city (high-altitude area) and Jeddah city (sea-level area) in Saudi Arabia. Binary particle swarm optimization (BPSO) is used in this study for making feature selections using three different machine learning models, i.e., the random forest model, gradient boosting model, and naive Bayes model. A number of predicting evaluation metrics including accuracy, training score, testing score, F-measure, recall, precision, and receiver operating characteristic (ROC) curve were calculated to verify the performance of the three machine learning models on these datasets. The experimental results demonstrated that the gradient boosting model gives better results than the random forest and naive Bayes models with an accuracy of 94.6% using the Taif city dataset. For the dataset of Jeddah city, the results demonstrated that the random forest model outperforms the gradient boosting and naive Bayes models with an accuracy of 95.5%. The dataset of Jeddah city achieved better results than the dataset of Taif city in Saudi Arabia using the enhanced model for the term of accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
12. Selection of Metaheuristic Algorithm to Design Wireless Sensor Network.
- Author
-
Zulfiqar, Rakhshan, Javed, Tariq, Ali, Zain Anwar, Alkhammash, Eman H., and Hadjouni, Myriam
- Subjects
WIRELESS sensor networks ,METAHEURISTIC algorithms ,SENSOR networks ,POSITION sensors ,SENSOR placement - Abstract
The deployment of sensor nodes is an important aspect in mobile wireless sensor networks for increasing network performance. The longevity of the networks is mostly determined by the proportion of energy consumed and the sensor nodes' access network. The optimal or ideal positioning of sensors improves the portable sensor networks effectiveness. Coverage and energy usage are mostly determined by successful sensor placement strategies. Nature-inspired algorithms are the most effective solution for short sensor lifetime. The primary objective of work is to conduct a comparative analysis of nature-inspired optimization for wireless sensor networks (WSNs') maximum network coverage. Moreover, it identifies quantity of installed sensor nodes for the given area. Superiority of algorithm has been identified based on value of optimized energy. The first half of the paper's literature on nature-inspired algorithms is discussed. Later six metaheuristics algorithms (Grey wolf, Ant lion, Dragonfly, Whale, Moth flame, Sine cosine optimizer) are compared for optimal coverage of WSNs. The simulation outcomes confirm that whale optimization algorithm (WOA) gives optimized Energy with improved network coverage with the least number of nodes. This comparison will be helpful for researchers who will use WSNs in their applications. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
13. Microservices‐based student support framework (MicSSF) to enhance equity in education.
- Author
-
Shaiba, Hadil, Hadjouni, Myriam, and John, Maya
- Subjects
EDUCATIONAL equalization ,INTERNET access ,MENTAL health counseling ,EDUCATION associations ,STUDENTS ,INTELLIGENT tutoring systems - Abstract
COVID‐19 has exposed and widened the disparity in education. The paper reviews the efforts made by educational institutions and organizations to offer services to the disadvantaged in an effort to eliminate the educational gap. Based on the literature, the primary issues which led to increasing in the gap of educational inequality were identified as the need for books, internet connection, study gadgets/devices, extra tutoring, food and study space, and psychological counseling. This paper proposes an online system using the microservices architecture to provide a holistic system that addresses the key concerns that contributed to the educational discrepancy. The application proposes a variety of business services that are logically separated from each other, and that can be deployed and scaled independently. Each of the provided services is autonomous and can communicate with other services. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
14. An Improved Skin Lesion Boundary Estimation for Enhanced-Intensity Images Using Hybrid Metaheuristics.
- Author
-
Malik, Shairyar, Akram, Tallha, Awais, Muhammad, Khan, Muhammad Attique, Hadjouni, Myriam, Elmannai, Hela, Alasiry, Areej, Marzougui, Mehrez, and Tariq, Usman
- Subjects
METAHEURISTIC algorithms ,COMPUTER vision ,TUMOR classification ,SKIN cancer ,ALGORITHMS - Abstract
The demand for the accurate and timely identification of melanoma as a major skin cancer type is increasing daily. Due to the advent of modern tools and computer vision techniques, it has become easier to perform analysis. Skin cancer classification and segmentation techniques require clear lesions segregated from the background for efficient results. Many studies resolve the matter partly. However, there exists plenty of room for new research in this field. Recently, many algorithms have been presented to preprocess skin lesions, aiding the segmentation algorithms to generate efficient outcomes. Nature-inspired algorithms and metaheuristics help to estimate the optimal parameter set in the search space. This research article proposes a hybrid metaheuristic preprocessor, BA-ABC, to improve the quality of images by enhancing their contrast and preserving the brightness. The statistical transformation function, which helps to improve the contrast, is based on a parameter set estimated through the proposed hybrid metaheuristic model for every image in the dataset. For experimentation purposes, we have utilised three publicly available datasets, ISIC-2016, 2017 and 2018. The efficacy of the presented model is validated through some state-of-the-art segmentation algorithms. The visual outcomes of the boundary estimation algorithms and performance matrix validate that the proposed model performs well. The proposed model improves the dice coefficient to 94.6% in the results. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
15. Detecting Deepfake Images Using Deep Learning Techniques and Explainable AI Methods.
- Author
-
Abir, Wahidul Hasan, Khanam, Faria Rahman, Alam, Kazi Nabiul, Hadjouni, Myriam, Elmannai, Hela, Bourouis, Sami, Dey, Rajesh, and Khan, Mohammad Monirujjaman
- Subjects
DEEP learning ,ARTIFICIAL intelligence ,MACHINE learning ,CONVOLUTIONAL neural networks ,DEEPFAKES ,TRUST - Abstract
Nowadays, deepfake is wreaking havoc on society. Deepfake content is created with the help of artificial intelligence and machine learning to replace one person’s likeness with another person in pictures or recorded videos. Although visual media manipulations are not new, the introduction of deepfakes has marked a breakthrough in creating fake media and information. These manipulated pictures and videos will undoubtedly have an enormous societal impact. Deepfake uses the latest technology like Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) to construct automated methods for creating fake content that is becoming increasingly difficult to detect with the human eye. Therefore, automated solutions employed by DL can be an efficient approach for detecting deepfake. Though the “black-box” nature of the DL system allows for robust predictions, they cannot be completely trustworthy. Explainability is the first step toward achieving transparency, but the existing incapacity of DL to explain its own decisions to human users limits the efficacy of these systems. Though Explainable Artificial Intelligence (XAI) can solve this problem by interpreting the predictions of these systems. This work proposes to provide a comprehensive study of deepfake detection using the DL method and analyze the result of the most effective algorithm with Local Interpretable Model-Agnostic Explanations (LIME) to assure its validity and reliability. This study identifies real and deepfake images using different Convolutional Neural Network (CNN) models to get the best accuracy. It also explains which part of the image caused the model to make a specific classification using the LIME algorithm. To apply the CNN model, the dataset is taken from Kaggle, which includes 70 k real images from the Flickr dataset collected by Nvidia and 70 k fake faces generated by StyleGAN of 256 px in size. For experimental results, Jupyter notebook, TensorFlow, NumPy, and Pandas were used as software, InceptionResnetV2, DenseNet201, InceptionV3, and ResNet152V2 were used as CNN models. All these models’ performances were good enough, such as InceptionV3 gained 99.68% accuracy, ResNet152V2 got an accuracy of 99.19%, and DenseNet201 performed with 99.81% accuracy. However, InceptionResNetV2 achieved the highest accuracy of 99.87%, which was verified later with the LIME algorithm for XAI, where the proposed method performed the best. The obtained results and dependability demonstrate its preference for detecting deepfake images effectively. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
16. Performance improvement of machine learning models via wavelet theory in estimating monthly river streamflow.
- Author
-
Wang, Kegang, Band, Shahab S., Ameri, Rasoul, Biyari, Meghdad, Hai, Tao, Hsu, Chung-Chian, Hadjouni, Myriam, Elmannai, Hela, Chau, Kwok-Wing, and Mosavi, Amir
- Subjects
WAVELETS (Mathematics) ,STREAMFLOW ,WATER management ,DECISION trees ,MACHINE performance ,STANDARD deviations ,MACHINE learning - Abstract
River streamflow is an essential hydrological parameters for optimal water resource management. This study investigates models used to estimate monthly time-series river streamflow data at two hydrological stations in the USA (Heise and Irwin on Snake River, Idaho). Five diverse types of machine learning (ML) model were tested, support vector machine-radial basis function (SVM-RBF), SVM-Polynomial (SVM-Poly), decision tree (DT), gradient boosting (GB), random forest (RF), and long short-term memory (LSTM). These were trained and tested alongside a conventional multiple linear regression (MLR). To improve the estimation and model performance, hybrid models were designed by coupling the models with wavelet theory (W). The models performance was assessed using root mean square error (RMSE), mean absolute error (MAE), coefficient of determination (R
2 ), Nash-Sutcliffe efficiency (NSE), and Willmott's index (WI). A side-by-side performance assessment of the stand-alone and hybrid models revealed that the coupled models exhibit better estimates of monthly river streamflow relative to the stand-alone ones. The statistical parameter values for the best model (W-LSTM4) during the test phase was RMSE = 36.533 m3 /s, MAE = 26.912 m3 /s, R2 = 0.947, NSE = 0.946, WI = 0.986 (Heise station), and RMSE = 33.378 m3 /s, MAE = 24.562 m3 /s, R2 = 0.952, NSE = 0.951, WI = 0.987 (Irwin station). [ABSTRACT FROM AUTHOR]- Published
- 2022
- Full Text
- View/download PDF
17. Blockchain-Based Formal Model for Food Supply Chain Management System Using VDM-SL.
- Author
-
Hameed, Hira, Zafar, Nazir Ahmad, Alkhammash, Eman H., and Hadjouni, Myriam
- Abstract
In modern society, the food supply chain management system has become an important research area realized nationally and internationally, which has established a collaborative relationship between producers, manufacturers, processors and retailers. Now, consumers are more interested in food quality, safety and the authentication of the products. Food safety has become an important issue in public health in the food market because people of all types and races around the world are affected due its poor quality. The traditional supply chains are centralized and face different issues such as lack of transparency, accountability and audit ability. The general issues in supply chain management include lack of communication, trust among the stakeholders, and interference of entities and wastage of food. A lot of work has been completed by researchers to address the above issues, but still, there is a need for effective mechanisms for the modeling of supply chain management systems. In this paper, a trusted, self-organized, traceable formal system based on blockchain and Internet of Things (IoT) is developed by using wireless sensors networks and finite automata. In the proposed model, smart contracts are designed to assure the automated payment procedures. The proposed model reduced the need for centralized authority. Unified Modeling Language (UML) is used to realize the requirements, and automata is used to capture behavior of the system. A blockchain-based model is used to provides the privacy and security mechanism for the transitions record. Wireless sensors are used to sense the information, and actors are used for decision making in case of any violation in the contact. A lot of work has been completed by researchers on smart contracts. Different smart contracts are designed to achieve the better traceability among producers, transporter/logistics and consumers. Our system provides the smart contract algorithm to show the interaction of entities in the food supply chain management system. Vienna Development Method-Specification Language (VDM-SL) is used to describe the formal system and the VDM-SL toolbox is used for the validation and analysis of the system. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
18. Roman Urdu Sentiment Analysis Using Transfer Learning.
- Author
-
Li, Dun, Ahmed, Kanwal, Zheng, Zhiyun, Mohsan, Syed Agha Hassnain, Alsharif, Mohammed H., Hadjouni, Myriam, Jamjoom, Mona M., and Mostafa, Samih M.
- Subjects
ARTIFICIAL neural networks ,SENTIMENT analysis ,LINGUISTIC minorities ,CONVOLUTIONAL neural networks - Abstract
Numerous studies have been conducted to meet the growing need for analytic tools capable of processing increasing amounts of textual data available online, and sentiment analysis has emerged as a frontrunner in this field. Current studies are focused on the English language, while minority languages, such as Roman Urdu, are ignored because of their complex syntax and lexical varieties. In recent years, deep neural networks have become the standard in this field. The entire potential of DL models for text SA has not yet been fully explored, despite their early success. For sentiment analysis, CNN has surpassed in accuracy, although it still has some imperfections. To begin, CNNs need a significant amount of data to train. Second, it presumes that all words have the same impact on the polarity of a statement. To fill these voids, this study proposes a CNN with an attention mechanism and transfer learning to improve SA performance. Compared to state-of-the-art methods, our proposed model appears to have achieved greater classification accuracy in experiments. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
19. Lemurs Optimizer: A New Metaheuristic Algorithm for Global Optimization.
- Author
-
Abasi, Ammar Kamal, Makhadmeh, Sharif Naser, Al-Betar, Mohammed Azmi, Alomari, Osama Ahmad, Awadallah, Mohammed A., Alyasseri, Zaid Abdi Alkareem, Doush, Iyad Abu, Elnagar, Ashraf, Alkhammash, Eman H., and Hadjouni, Myriam
- Subjects
METAHEURISTIC algorithms ,GLOBAL optimization ,LEMURS ,MATHEMATICAL optimization ,COLUMNS - Abstract
The Lemur Optimizer (LO) is a novel nature-inspired algorithm we propose in this paper. This algorithm's primary inspirations are based on two pillars of lemur behavior: leap up and dance hub. These two principles are mathematically modeled in the optimization context to handle local search, exploitation, and exploration search concepts. The LO is first benchmarked on twenty-three standard optimization functions. Additionally, the LO is used to solve three real-world problems to evaluate its performance and effectiveness. In this direction, LO is compared to six well-known algorithms: Salp Swarm Algorithm (SSA), Artificial Bee Colony (ABC), Sine Cosine Algorithm (SCA), Bat Algorithm (BA), Flower Pollination Algorithm (FPA), and JAYA algorithm. The findings show that the proposed algorithm outperforms these algorithms in fourteen standard optimization functions and proves the LO's robust performance in managing its exploration and exploitation capabilities, which significantly leads LO towards the global optimum. The real-world experimental findings demonstrate how LO may tackle such challenges competitively. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
20. Formal Modeling of IoT-Based Drone Network for Combating COVID-19 Pandemic.
- Author
-
Iqbal, Moeeza, Zafar, Nazir Ahmad, Alkhammash, Eman H., and Hadjouni, Myriam
- Subjects
COVID-19 ,COVID-19 pandemic ,VIRUS diseases ,DRONE aircraft ,STANDARD operating procedure ,WEARABLE technology - Abstract
Coronavirus biologically named COVID-19 is a disease that is circulating throughout the world due to its viral nature. The interaction of people is a source of spreading of coronavirus. Millions of people have been affected by this virus, and most of them have lost their lives. At present, this viral disease has grown into a worldwide pandemic which is a troubling spot for the whole world. Few technologies are supporting to manage and solve the COVID-19 crisis. In this paper, unified modeling language (UML) will be used to describe requirements and behavior of the proposed system. Unmanned aerial vehicle (UAV) drones are flying mechanical devices without any human pilot that is efficient to reduce the spreading rate of COVID-19. In the proposed IoT-based model, a cluster-based drones' network will be used to monitor and perform required actions to tackle the violations of standard operating procedures (SOPs). The drones will gather all data through embedded cameras and sensors and will communicate with the control room to operate the actions as required. In this model, a well-maintained and collision-free network of drones will be designed using graph theory. Drones' network will observe the violation of SOPs in the targeted area and make decisions such as produce alarm sound to alert persons and through communications by sending people warning messages on their smartphones. Further, the persons having COVID symptoms such as high temperature and unbalance respiratory rates will be identified using wearable sensors that are deployed to the targeted area and will send information to the control room to perform required actions. Drones will be able to provide medical kits to the patients' residences that are identified using wearable sensors to reduce interaction of people. The model will be specified using Vienna Development Method-Specification language (VDM-SL) and validated through the VDM-SL toolbox. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
21. A Deep Learning-Based Framework for Feature Extraction and Classification of Intrusion Detection in Networks.
- Author
-
Naveed, Muhammad, Arif, Fahim, Usman, Syed Muhammad, Anwar, Aamir, Hadjouni, Myriam, Elmannai, Hela, Hussain, Saddam, Ullah, Syed Sajid, and Umar, Fazlullah
- Subjects
INTRUSION detection systems (Computer security) ,FEATURE extraction ,FEATURE selection ,DEEP learning ,PRINCIPAL components analysis ,MACHINE learning - Abstract
An intrusion detection system, often known as an IDS, is extremely important for preventing attacks on a network, violating network policies, and gaining unauthorized access to a network. The effectiveness of IDS is highly dependent on data preprocessing techniques and classification models used to enhance accuracy and reduce model training and testing time. For the purpose of anomaly identification, researchers have developed several machine learning and deep learning-based algorithms; nonetheless, accurate anomaly detection with low test and train times remains a challenge. Using a hybrid feature selection approach and a deep neural network- (DNN-) based classifier, the authors of this research suggest an enhanced intrusion detection system (IDS). In order to construct a subset of reduced and optimal features that may be used for classification, a hybrid feature selection model that consists of three methods, namely, chi square, ANOVA, and principal component analysis (PCA), is applied. These methods are referred to as "the big three." On the NSL-KDD dataset, the suggested model receives training and is then evaluated. The proposed method was successful in achieving the following results: a reduction of input data by 40%, an average accuracy of 99.73%, a precision score of 99.75%, an F1 score of 99.72%, and an average training and testing time of 138% and 2.7 seconds, respectively. The findings of the experiments demonstrate that the proposed model is superior to the performance of the other comparison approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
22. Design and Analysis of a 5G Wideband Antenna for Wireless Body-Centric Network.
- Author
-
Khan, Mohammad Monirujjaman, Rahman, H. M. Arifur, Shovon, Md. Nakib Alam, Alhakami, Wajdi, Hadjouni, Myriam, Elmannai, Hela, and Bourouis, Sami
- Subjects
ANTENNAS (Electronics) ,IMAGING phantoms ,ANTENNA design ,COMPUTER engineering ,5G networks ,IMPEDANCE matching - Abstract
A compact 5G wideband antenna for body-centric network (BCN) operating on Ka band has been presented in this paper. The design of the antenna consists of a very simple key-shaped radiator patch with a vertical slot for better impedance matching. The antenna was designed and simulated with the help of the Computer Simulation Technology (CST) Microwave Studio Suite, a well-liked and dependable electromagnetic simulation program running on Microsoft Windows. Free-space simulation produces a resonant frequency at 28 GHz, which falls under the Ka band and 5G's n257, more precisely n261. The proposed antenna has a size of 1.24 λ × 0.6 λ × 0.153 λ and has a wider impedance bandwidth of more than 20 GHz. The antenna's gain and radiation efficiency are 3.87 dBi and 70%, respectively, at the resonant point. Further parametric studies reveal that the antenna can be activated in the V-band by increasing the feedline width. The antenna is proposed for the application of BCN. Therefore, a three-dimensional human torso phantom was developed virtually to test on-body performance. The on-body findings of this antenna were resimulated by positioning the antenna in close proximity to the three-layer human body model, where 22.5 dB of on-body reflection coefficient was recorded at 28 GHz. Simulated on-body gain and efficiency were 4.56 dBi and 61.33 percent, respectively. A distance-based investigation was conducted to investigate the impacts of the human body's presence by positioning the antenna at five different distances from the human torso model. The findings were compared to assess how distance affects its behaviors. The antenna's gap was kept at 6 mm for the optimum results, which included 4.83 dBi of gain with a 66 percent efficiency and a recorded RL value of about 23 dB. The on-body simulations produced very consistent results with a slight deviation after 26.5 GHz, even though the distance was varied. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
23. Convergence Analysis of Path Planning of Multi-UAVs Using Max-Min Ant Colony Optimization Approach.
- Author
-
Shafiq, Muhammad, Ali, Zain Anwar, Israr, Amber, Alkhammash, Eman H., Hadjouni, Myriam, and Jussila, Jari Juhani
- Subjects
ANT algorithms ,PATH analysis (Statistics) ,DIFFERENTIAL evolution - Abstract
Unmanned Aerial Vehicles (UAVs) seem to be the most efficient way of achieving the intended aerial tasks, according to recent improvements. Various researchers from across the world have studied a variety of UAV formations and path planning methodologies. However, when unexpected obstacles arise during a collective flight, path planning might get complicated. The study needs to employ hybrid algorithms of bio-inspired computations to address path planning issues with more stability and speed. In this article, two hybrid models of Ant Colony Optimization were compared with respect to convergence time, i.e., the Max-Min Ant Colony Optimization approach in conjunction with the Differential Evolution and Cauchy mutation operators. Each algorithm was run on a UAV and traveled a predetermined path to evaluate its approach. In terms of the route taken and convergence time, the simulation results suggest that the MMACO-DE technique outperforms the MMACO-CM approach. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
24. Performance Evaluation of Simple K-Mean and Parallel K-Mean Clustering Algorithms: Big Data Business Process Management Concept.
- Author
-
Zada, Islam, Ali, Shaukat, Khan, Inayat, Hadjouni, Myriam, Elmannai, Hela, Zeeshan, Muhammad, Serat, Ali Mohammad, and Jameel, Abid
- Subjects
BIG data ,BUSINESS process management ,BIG business ,ELECTRONIC data processing ,ALGORITHMS ,PARALLEL algorithms ,DATA extraction - Abstract
Data is the most valuable asset in any firm. As time passes, the data expands at a breakneck speed. A major research issue is the extraction of meaningful information from a complex and huge data source. Clustering is one of the data extraction methods. The basic K-Mean and Parallel K-Mean partition clustering algorithms work by picking random starting centroids. The basic and K-Mean parallel clustering methods are investigated in this work using two different datasets with sizes of 10000 and 5000, respectively. The findings of the Simple K-Mean clustering algorithms alter throughout numerous runs or iterations, according to the study, and so iterations differ for each run or execution. In some circumstances, the clustering algorithms' outcomes are always different, and the algorithms separate and identify unique properties of the K-Mean Simple clustering algorithm from the K-Mean Parallel clustering algorithm. Differentiating these features will improve cluster quality, lapsed time, and iterations. Experiments are designed to show that parallel algorithms considerably improve the Simple K-Mean techniques. The findings of the parallel techniques are also consistent; however, the Simple K-Mean algorithm's results vary from run to run. Both the 10,000 and 5000 data item datasets are divided into ten subdatasets for ten different client systems. Clusters are generated in two iterations, i.e., the time it takes for all client systems to complete one iteration (mentioned in chapter number 4). In the first execution, Client No. 5 has the longest elapsed time (8 ms), whereas the longest elapsed time in the following iterations is 6 ms, for a total elapsed time of 12 ms for the K-Mean clustering technique. In addition, the Parallel algorithms reduce the number of executions and the time it takes to complete a task. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
25. A Hybrid Ensemble Stacking Model for Gender Voice Recognition Approach.
- Author
-
Alkhammash, Eman H., Hadjouni, Myriam, and Elshewey, Ahmed M.
- Subjects
AUTOMATIC speech recognition ,FISHER discriminant analysis ,RECEIVER operating characteristic curves ,SUPPORT vector machines ,K-nearest neighbor classification ,MACHINE learning - Abstract
Gender recognition by voice is a vital research subject in speech processing and acoustics, as human voices have many remarkable characteristics. Voice recognition is beneficial in a variety of applications, including mobile health care systems, interactive systems, crime analysis, and recognition systems. Several algorithms for voice recognition have been developed, but there is still potential for development in terms of the system's accuracy and efficiency. Recent research has focused on combining ensemble learning with a variety of machine learning models in order to create more accurate classifiers. In this paper, a stacked ensemble for gender voice recognition model is presented, using four classifiers, namely, k-nearest neighbor (KNN), support vector machine (SVM), stochastic gradient descent (SGD), and logistic regression (LR) as base classifiers and linear discriminant analysis (LDA) as meta classifier. The dataset used includes 3168 instances and 21 features, where 20 features are the predictors, and one feature is the target. Several prediction evaluation metrics, including precision, accuracy, recall, F1 score, and area under the receiver operating characteristic curve (AUC), were computed to verify the execution of the proposed model. The results obtained illustrated that the stacked model achieved better results compared to other conventional machine learning models. The stacked model achieved high accuracy with 99.64%. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
26. A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering.
- Author
-
Ullah, Safi, Ahmad, Jawad, Khan, Muazzam A., Alkhammash, Eman H., Hadjouni, Myriam, Ghadi, Yazeed Yasin, Saeed, Faisal, and Pitropakis, Nikolaos
- Subjects
CONVOLUTIONAL neural networks ,INTERNET of things ,SIGNAL convolution ,DEEP learning ,MACHINE learning ,ENGINEERING - Abstract
The Internet of Things (IoT) is a widely used technology in automated network systems across the world. The impact of the IoT on different industries has occurred in recent years. Many IoT nodes collect, store, and process personal data, which is an ideal target for attackers. Several researchers have worked on this problem and have presented many intrusion detection systems (IDSs). The existing system has difficulties in improving performance and identifying subcategories of cyberattacks. This paper proposes a deep-convolutional-neural-network (DCNN)-based IDS. A DCNN consists of two convolutional layers and three fully connected dense layers. The proposed model aims to improve performance and reduce computational power. Experiments were conducted utilizing the IoTID20 dataset. The performance analysis of the proposed model was carried out with several metrics, such as accuracy, precision, recall, and F1-score. A number of optimization techniques were applied to the proposed model in which Adam, AdaMax, and Nadam performance was optimum. In addition, the proposed model was compared with various advanced deep learning (DL) and traditional machine learning (ML) techniques. All experimental analysis indicates that the accuracy of the proposed approach is high and more robust than existing DL-based algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
27. A Multi-Colony Social Learning Approach for the Self-Organization of a Swarm of UAVs.
- Author
-
Shafiq, Muhammad, Ali, Zain Anwar, Israr, Amber, Alkhammash, Eman H., and Hadjouni, Myriam
- Published
- 2022
- Full Text
- View/download PDF
28. Formal Modeling of IoT-Based Distribution Management System for Smart Grids.
- Author
-
Kousar, Shaheen, Zafar, Nazir Ahmad, Ali, Tariq, Alkhammash, Eman H., and Hadjouni, Myriam
- Abstract
The smart grid is characterized as a power system that integrates real-time measurements, bi-directional communication, a two-way flow of electricity, and evolutionary computation. The power distribution system is a fundamental aspect of the electric power system in order to deliver safe, efficient, reliable, and resilient power to consumers. A distribution management system (DMS) begins with the extension of the Supervisory Control and Data Acquisition (SCADA) system through a transmission network beyond the distribution network. These transmission networks oversee the distribution of energy generated at power plants to consumers via a complex system of transformers, substations, transmission lines, and distribution lines. The major challenges that existing distribution management systems are facing, maintaining constant power loads, user profiles, centralized communication, and the malfunctioning of system equipment and monitoring huge amounts of data of millions of micro-transactions, need to be addressed. Substation feeder protection abruptly shuts down power on the whole feeder in the event of a distribution network malfunction, causing service disruption to numerous end-user clients, including industrial, hospital, commercial, and residential users. Although there are already many traditional systems with the integration of smart things at present, there are few studies of those systems reporting runtime errors during their implementation and real-time use. This paper presents the systematic model of a distribution management system comprised of substations, distribution lines, and smart meters with the integration of Internet-of-Things (IoT), Nondeterministic Finite Automata (NFA), Unified Modeling Language (UML), and formal modeling approaches. Non-deterministic finite automata are used for automating the system procedures. UML is used to represent the actors involved in the distribution management system. Formal methods from the perspective of the Vienna Development Method-Specification Language (VDM-SL) are used for modeling the system. The model will be analyzed using the facilities available in the VDM-SL toolbox. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
29. Covid-19 CT Lung Image Segmentation Using Adaptive Donkey and Smuggler Optimization Algorithm.
- Author
-
Prabu, P., Venkatachalam, K., Alluhaidan, Ala Saleh, Marzouk, Radwa, Hadjouni, Myriam, and El_Rahman, Sahar A.
- Subjects
COMPUTED tomography ,IMAGE segmentation ,COVID-19 ,LUNGS ,MATHEMATICAL optimization ,DONKEYS - Abstract
COVID'19 has caused the entire universe to be in existential health crisis by spreading globally in the year 2020. The lungs infection is detected in Computed Tomography (CT) images which provide the best way to increase the existing healthcare schemes in preventing the deadly virus. Nevertheless, separating the infected areas in CT images faces various issues such as lowintensity difference among normal and infectious tissue and high changes in the characteristics of the infection. To resolve these issues, a new inf-Net (Lung Infection Segmentation Deep Network) is designed for detecting the affected areas from the CT images automatically. For the worst segmentation results, the Edge-Attention Representation (EAR) is optimized using Adaptive Donkey and Smuggler Optimization (ADSO). The edges which are identified by the ADSO approach is utilized for calculating dissimilarities. An IFCM (Intuitionistic Fuzzy C-Means) clustering approach is applied for computing the similarity of the EA component among the generated edge maps and Ground-Truth (GT) edge maps. Also, a Semi-Supervised Segmentation (SSS) structure is designed using the Randomly Selected Propagation (RP) technique and Inf-Net, which needs only less number of images and unlabelled data. Semi-Supervised Multi-Class Segmentation (SSMCS) is designed using a Bi-LSTM (Bi-Directional Long-Short-Term-memory), acquires all the advantages of the disease segmentation done using Semi Inf-Net and enhances the execution of multi-class disease labelling. The newly designed SSMCS approach is compared with existing U-Net++, MCS, and Semi-Inf-Net. factors such as MAE (Mean Absolute Error), Structure measure, Specificity (Spec), Dice Similarity coefficient, Sensitivity (Sen), and Enhance-Alignment Measure are considered for evaluation purpose. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
30. Cryptanalysis and Improvements on Quantum Key Agreement Protocol Based on Quantum Search Algorithm.
- Author
-
Abulkasim, Hussein, Alabdulkreem, Eatedal, Karim, Faten, Ahmed, Nada, Jamjoom, Mona, Hadjouni, Myriam, and Abbas, Safia
- Subjects
SEARCH algorithms ,KEY agreement protocols (Computer network protocols) ,CRYPTOGRAPHY ,TABU search algorithm - Abstract
Recently, Huang et al. (2021) presented a quantum key agreement schemeto securely negotiate on a secret key employing the properties of a quantumsearch algorithm. First, the authors proposed the two-party quantum key agreement, and then they extended their work to the three-party case. Huang et al.'s protocol employs the unitary operation and single-particle measurements to negotiate on a secret key without using complex quantum technologies such as quantum memory or entangled quantum particles. The authors claimed that their protocol is secure and efficient. However, this work shows that Huang et al.'s protocol has a significant pitfall, where the private key of one user could be easily leaked to the attackers. Hence, the properties of security and fairness are not achieved. Accordingly, thetwo-party and three-party of Huang et al.'s protocol have been reviewed, and an improvementto address the shortcoming is suggested. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
31. A Leader-Follower Formation Control of Multi-UAVs via an Adaptive Hybrid Controller.
- Author
-
Ali, Zain Anwar, Israr, Amber, Alkhammash, Eman H., and Hadjouni, Myriam
- Subjects
FORMATION flying ,FUZZY logic ,INTEGRATORS ,DRONE aircraft ,LOGIC - Abstract
The purpose of this study is to offer an adaptive hybrid controller for the formation control of multiple unmanned aerial vehicles (UAVs) leader-follower configurations with communication delay. Although numerous studies about the control of the formation exist, very few incorporate the delay in their model and are adaptive as well. The motivation behind this article is to bridge that gap. The strategy consists of an adaptive fuzzy logic controller and a Proportional, Integral, and Derivative (PID) controller where the logic controller fines/tunes the PID controller gains. The controller also consists of an integrator that raises the order of the system which helps reduce the noise and steady-state errors. The simulations confirm that the proposed technique is robust and satisfies mission requirements. Moreover, the flying formations of the swarm were created by a B-spline curve based on a simple waypoint. The main contribution of this study is to present a model where the formation remains stable during the whole flight, errors are within the optimal range, and the time delays are manageable. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
32. Guidance, Navigation, and Control for Fixed-Wing UAV.
- Author
-
Israr, Amber, Alkhammash, Eman H., and Hadjouni, Myriam
- Subjects
VERTICALLY rising aircraft ,MODULAR coordination (Architecture) ,ALTITUDES ,NAVIGATION ,ALGORITHMS ,MATHEMATICAL models - Abstract
The purpose of this paper is to develop a fixed-wing aircraft that has the abilities of both vertical take-off (VTOL) and a fixed-wing aircraft. To achieve this goal, a prototype of a fixed-wing gyroplane with two propellers is developed and a rotor can maneuver like a drone and also has the ability of vertical take-off and landing similar to a helicopter. This study provides guidance, navigation, and control algorithm for the gyrocopter. Firstly, this study describes the dynamics of the fixed-wing aircraft and its control inputs, i.e., throttle, blade pitch, and thrust vectors. Secondly, the inflow velocity, the forces acting on the rotor blade, and the factors affecting the rotor speed are analyzed. Afterward, the mathematical models of the rotor, dual engines, wings, and vertical and horizontal tails are presented. Later, the flight control strategy using a global processing system (GPS) module is designed. The parameters that are examined are attitude, speed, altitude, turn, and take-off control. Lastly, hardware in the loop (HWIL) based simulations proves the effectiveness and robustness of the navigation guidance and control mechanism. The simulations confirm that the proposed novel mechanism is robust and satisfies mission requirements. The gyrocopter remains stable during the whole flight and maneuvers the designated path efficiently. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
33. Intelligent Recommendations of Startup Projects in Smart Cities and Smart Health Using Social Media Mining.
- Author
-
Ben Abdessalem Karaa, Wahiba, Alkhammash, Eman, Slimani, Thabet, and Hadjouni, Myriam
- Subjects
SMART cities ,URBAN health ,KEY performance indicators (Management) ,NEW business enterprises ,INTELLIGENT transportation systems ,NATIONAL income ,MINES & mineral resources ,SOCIAL media - Abstract
The paper presents a recommendation model for developing new smart city and smart health projects. The objective is to provide recommendations to citizens about smart city and smart health startups to improve entrepreneurship and leadership. These recommendations may lead to the country's advancement and the improvement of national income and reduce unemployment. This work focuses on designing and implementing an approach for processing and analyzing tweets inclosing data related to smart city and smart health startups and providing recommended projects as well as their required skills and competencies. This approach is based on tweets mining through a machine learning method, the Word2Vec algorithm, combined with a recommendation technique conducted via an ontology-based method. This approach allows discovering the relevant startup projects in the context of smart cities and makes links to the needed skills and competencies of users. A system was implemented to validate this approach. The attained performance metrics related to precision, recall, and F-measure are, respectively, 95%, 66%, and 79%, showing that the results are very encouraging. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
34. Emotion-based music recommendation and classification using machine learning with IoT Framework.
- Author
-
Quasim, Mohammad Tabrez, Alkhammash, Eman H., Khan, Mohammad Ayoub, and Hadjouni, Myriam
- Subjects
MACHINE learning ,INDUSTRY 4.0 ,INTERNET of things ,EMOTION regulation ,MUSIC audiences - Abstract
Technological advances integrating emotional maturity with established IoT systems are being examined with the emergence of the fourth industrial revolution. In this article, researchers propose an emotion-based music recommendation and classification framework (EMRCF) categorizing songs with high precision following individuals' interpersonal team with memory and emotional songs. In specific, when adding new tunes to an IoT app fortune, methods must be developed that immediately categorize the characters based on people's emotions. That's one of the essential questions for project management. The empathic framework is used to research to identify emotional information. Musical characteristics can be derived from discussions in a micro-enterprise with the task force. Correlation analysis and supporting neural network is used to perform dynamic designation. The innovative prediction accuracy proposed recognizes most of the emotional responses triggered by music audience members and effectively categorizes songs. Furthermore, a comparison study is made with proposed algorithms such as decision trees, deep cognitive system and neighbor-closest, and relevance vector machines. The EMRCF reaches the prediction accuracy of 96.12% and the precision rate of 96.69%, which is not achieved by existing approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.