179 results on '"Motwakel, Abdelwahed"'
Search Results
2. Robust Tweets Classification Using Arithmetic Optimization with Deep Learning for Sustainable Urban Living
- Author
-
Hamza, Manar Ahmed, Hashim, Aisha Hassan Abdalla, Motwakel, Abdelwahed, Elhameed, Elmouez Samir Abd, Osman, Mohammed, Kumar, Arun, Singla, Chinu, and Munjal, Muskaan
- Published
- 2024
- Full Text
- View/download PDF
3. Deep learning enabled class imbalance with sand piper optimization based intrusion detection for secure cyber physical systems
- Author
-
Hilal, Anwer Mustafa, Al-Otaibi, Shaha, Mahgoub, Hany, Al-Wesabi, Fahd N., Aldehim, Ghadah, Motwakel, Abdelwahed, Rizwanullah, Mohammed, and Yaseen, Ishfaq
- Published
- 2023
- Full Text
- View/download PDF
4. Improved metaheuristics with deep learning based object detector for intelligent control in autonomous vehicles
- Author
-
Alasmari, Naif, Alohali, Manal Abdullah, Khalid, Majdi, Almalki, Nabil, Motwakel, Abdelwahed, Alsaid, Mohamed Ibrahim, Osman, Azza Elneil, and Alneil, Amani A
- Published
- 2023
- Full Text
- View/download PDF
5. Swarm intelligence for IoT attack detection in fog-enabled cyber-physical system
- Author
-
Alohali, Manal Abdullah, Elsadig, Muna, Al-Wesabi, Fahd N., Duhayyim, Mesfer Al, Hilal, Anwer Mustafa, and Motwakel, Abdelwahed
- Published
- 2023
- Full Text
- View/download PDF
6. Cyber attack detection in healthcare data using cyber-physical system with optimized algorithm
- Author
-
Alrowais, Fadwa, Mohamed, Heba G., Al-Wesabi, Fahd N., Al Duhayyim, Mesfer, Hilal, Anwer Mustafa, and Motwakel, Abdelwahed
- Published
- 2023
- Full Text
- View/download PDF
7. Sustainable groundwater management using stacked LSTM with deep neural network
- Author
-
Alabdulkreem, Eatedal, Alruwais, Nuha, Mahgoub, Hany, Dutta, Ashit Kumar, Khalid, Majdi, Marzouk, Radwa, Motwakel, Abdelwahed, and Drar, Suhanda
- Published
- 2023
- Full Text
- View/download PDF
8. Optimal deep transfer learning based ethnicity recognition on face images
- Author
-
Obayya, Marwa, Alotaibi, Saud S., Dhahb, Sami, Alabdan, Rana, Al Duhayyim, Mesfer, Hamza, Manar Ahmed, Rizwanullah, Mohammed, and Motwakel, Abdelwahed
- Published
- 2022
- Full Text
- View/download PDF
9. Trust aware oppositional sine cosine based multihop routing protocol for improving survivability of wireless sensor network
- Author
-
Hilal, Anwer Mustafa, Albraikan, Amani Abdulrahman, Dhahbi, Sami, Alotaibi, Saud S., Alabdan, Rana, Duhayyim, Mesfer Al, Motwakel, Abdelwahed, and Yaseen, Ishfaq
- Published
- 2022
- Full Text
- View/download PDF
10. A Novel Hybrid Convolutional and Network Encapsulation Approach in EfficientNetV2-S Architecture for Acute Lymphoblastic Leukemia Classification.
- Author
-
Muntasa, Arif, Sugiarti, Alisa, Wahyuningrum, Rima Tri, Husni, Ghufron, M. Ali, Hermawan, Almohamedh, Refan Mohamed, Motwakel, Abdelwahed, Asmara, Yuli Panca, Dewi, Deshinta Arrova, and Tuzzahra, Zabrina
- Subjects
LYMPHOBLASTIC leukemia ,IMAGE recognition (Computer vision) ,ACUTE leukemia ,CHILDHOOD cancer ,CELL imaging - Abstract
Acute Lymphoblastic Leukemia (ALL) is one of the most common cancers among children under the age of 15. An increasing awareness to detect early leukemia can be avoided preventable deaths from leukemia. Accurate leukemia cells image classification plays a crucial role in reducing health risks by enabling early diagnosis, which helps in mitigating the severity of the disease through timely and targeted treatment The detection of Acute Lymphoblastic Leukemia incurs significant costs in terms of time. We have developed an alternative method, A Modified EfficientNetV2-S to detect Acute Lymphoblastic Leukemia quickly, accurately, and affordably. We proposed a new architecture called Hybrid Kernel on EfficientNetV2-S. Our architecture integrates three convolutions with different kernels: regular convolution, dilated convolution, and depth-wise convolution. Three convolutions work together in one layer to provide detailed information about the object. The Network Encapsulation method uses convolution results to find object features from an image based on different locations and directions and provide combined convoluted information. We update the weight to customize the Networks Encapsulation feature map results iteratively. We continuously repeat this operation until the updated weight difference falls below the specified threshold. The approach we suggested is unique because it uses several kernels for convolutions to help capture various feature variations. We have evaluated our new architecture using the C-NMC-2019 dataset at three learning and epoch pairs: {0.001;5}, {0.0001;10}, and {0.00001;15}. We used 12,528 images to assess the reliability of our proposed new architecture. The results showed that the best accuracy, precision, recall, and F1-Score were 97.44%, 97.35%, 98.88%, and 97.48%, respectively. Our proposed method performance outperformed VGG19, Xception, RestNet50, and EfficientNetB0. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Robust sign language detection for hearing disabled persons by Improved Coyote Optimization Algorithm with deep learning.
- Author
-
Asiri, Mashael M., Motwakel, Abdelwahed, and Drar, Suhanda
- Subjects
OPTIMIZATION algorithms ,MACHINE learning ,SIGN language ,PEOPLE with disabilities ,COMPUTER vision ,DEEP learning - Abstract
Sign language (SL) recognition for individuals with hearing disabilities involves leveraging machine learning (ML) and computer vision (CV) approaches for interpreting and understanding SL gestures. By employing cameras and deep learning (DL) approaches, namely convolutional neural networks (CNN) and recurrent neural networks (RNN), these models analyze facial expressions, hand movements, and body gestures connected with SL. The major challenges in SL recognition comprise the diversity of signs, differences in signing styles, and the need to recognize the context in which signs are utilized. Therefore, this manuscript develops an SL detection by Improved Coyote Optimization Algorithm with DL (SLR-ICOADL) technique for hearing disabled persons. The goal of the SLR-ICOADL technique is to accomplish an accurate detection model that enables communication for persons using SL as a primary case of expression. At the initial stage, the SLR-ICOADL technique applies a bilateral filtering (BF) approach for noise elimination. Following this, the SLR-ICOADL technique uses the Inception-ResNetv2 for feature extraction. Meanwhile, the ICOA is utilized to select the optimal hyperparameter values of the DL model. At last, the extreme learning machine (ELM) classification model can be utilized for the recognition of various kinds of signs. To exhibit the better performance of the SLR-ICOADL approach, a detailed set of experiments are performed. The experimental outcome emphasizes that the SLR-ICOADL technique gains promising performance in the SL detection process. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Artificial Rabbit Optimizer with deep learning for fall detection of disabled people in the IoT Environment.
- Author
-
Alabdulkreem, Eatedal, Alduhayyem, Mesfer, Al-Hagery, Mohammed Abdullah, Motwakel, Abdelwahed, Hamza, Manar Ahmed, and Marzouk, Radwa
- Subjects
PEOPLE with disabilities ,DEEP learning ,RECURRENT neural networks ,INTERNET of things ,CONVOLUTIONAL neural networks ,PERSONAL space - Abstract
Fall detection (FD) for disabled persons in the Internet of Things (IoT) platform contains a combination of sensor technologies and data analytics for automatically identifying and responding to samples of falls. In this regard, IoT devices like wearable sensors or ambient sensors from the personal space role a vital play in always monitoring the user's movements. FD employs deep learning (DL) in an IoT platform using sensors, namely accelerometers or depth cameras, to capture data connected to human movements. DL approaches are frequently recurrent neural networks (RNNs) or convolutional neural networks (CNNs) that have been trained on various databases for recognizing patterns connected with falls. The trained methods are then executed on edge devices or cloud environments for real-time investigation of incoming sensor data. This method differentiates normal activities and potential falls, triggering alerts and reports to caregivers or emergency numbers once a fall is identified. We designed an Artificial Rabbit Optimizer with a DL-based FD and classification (ARODL-FDC) system from the IoT environment. The ARODL-FDC approach proposes to detect and categorize fall events to assist elderly people and disabled people. The ARODL-FDC technique comprises a fourstage process. Initially, the preprocessing of input data is performed by Gaussian filtering (GF). The ARODL-FDC technique applies the residual network (ResNet) model for feature extraction purposes. Besides, the ARO algorithm has been utilized for better hyperparameter choice of the ResNet algorithm. At the final stage, the full Elman Neural Network (FENN) model has been utilized for the classification and recognition of fall events. The experimental results of the ARODL-FDC technique can be tested on the fall dataset. The simulation results inferred that the ARODL-FDC technique reaches promising performance over compared models concerning various measures. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Fireworks Optimization with Deep Learning-Based Arabic Handwritten Characters Recognition Model.
- Author
-
Motwakel, Abdelwahed, Al-onazi, Badriyya B., Alzahrani, Jaber S., Yafoz, Ayman, Othman, Mahmoud, Zamani, Abu Sarwar, Yaseen, Ishfaq, and Abdelmageed, Amgad Atta
- Abstract
Handwritten character recognition becomes one of the challenging research matters. More studies were presented for recognizing letters of various languages. The availability of Arabic handwritten characters databases was confined. Almost a quarter of a billion people worldwide write and speak Arabic. More historical books and files indicate a vital data set for many Arab nations written in Arabic. Recently, Arabic handwritten character recognition (AHCR) has grabbed the attention and has become a difficult topic for pattern recognition and computer vision (CV). Therefore, this study develops fireworks optimization with the deep learning-based AHCR (FWODL-AHCR) technique. The major intention of the FWODL-AHCR technique is to recognize the distinct handwritten characters in the Arabic language. It initially pre-processes the handwritten images to improve their quality of them. Then, the RetinaNet-based deep convolutional neural network is applied as a feature extractor to produce feature vectors. Next, the deep echo state network (DESN) model is utilized to classify handwritten characters. Finally, the FWO algorithm is exploited as a hyperparameter tuning strategy to boost recognition performance. Various simulations in series were performed to exhibit the enhanced performance of the FWODL-AHCR technique. The comparison study portrayed the supremacy of the FWODL-AHCR technique over other approaches, with 99.91% and 98.94% on Hijja and AHCD datasets, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Digital Text Document Watermarking Based Tampering Attack Detection via Internet.
- Author
-
Alohali, Manal Abdullah, Elsadig, Muna, Al-Wesabi, Fahd N., Al Duhayyim, Mesfer, Hilal, Anwer Mustafa, and Motwakel, Abdelwahed
- Subjects
DIGITAL watermarking ,PRODUCT tampering ,COMPUTER access control ,INTERNET content ,INTERNET security ,DATA extraction ,DATA transmission systems - Abstract
Owing to the rapid increase in the interchange of text information through internet networks, the reliability and security of digital content are becoming a major research problem. Tampering detection, Content authentication, and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies. The authors' difficulties were tampering detection, authentication, and integrity verification of the digital contents. This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection (ADMDTW-TAD) via the Internet. The DM concept is exploited in the presented ADMDTW-TAD technique to identify the document's appropriate characteristics to embed larger watermark information. The presented secure watermarking scheme intends to transmit digital text documents over the Internet securely. Once the watermark is embedded with no damage to the original document, it is then shared with the destination. The watermark extraction process is performed to get the original document securely. The experimental validation of the ADMDTW-TAD technique is carried out under varying levels of attack volumes, and the outcomes were inspected in terms of different measures. The simulation values indicated that the ADMDTW-TAD technique improved performance over other models. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Chaotic Elephant Herd Optimization with Machine Learning for Arabic Hate Speech Detection.
- Author
-
Al-onazi, Badriyya B., Alzahrani, Jaber S., Alotaibi, Najm, Alshahrani, Hussain, Elfaki, Mohamed Ahmed, Marzouk, Radwa, Mohsen, Heba, and Motwakel, Abdelwahed
- Subjects
HATE speech ,MACHINE learning ,ONLINE social networks ,SOCIAL media in business ,ARABIC language ,SUPPORT vector machines ,SOCIAL media ,DEAF children - Abstract
In recent years, the usage of social networking sites has considerably increased in the Arab world. It has empowered individuals to express their opinions, especially in politics. Furthermore, various organizations that operate in the Arab countries have embraced social media in their day-to-day business activities at different scales. This is attributed to business owners' understanding of social media's importance for business development. However, the Arabic morphology is too complicated to understand due to the availability of nearly 10,000 roots and more than 900 patterns that act as the basis for verbs and nouns. Hate speech over online social networking sites turns out to be a worldwide issue that reduces the cohesion of civil societies. In this background, the current study develops a Chaotic Elephant Herd Optimization with Machine Learning for Hate Speech Detection (CEHOML-HSD) model in the context of the Arabic language. The presented CEHOML-HSD model majorly concentrates on identifying and categorising the Arabic text into hate speech and normal. To attain this, the CEHOML-HSD model follows different sub-processes as discussed herewith. At the initial stage, the CEHOML-HSD model undergoes data pre-processing with the help of the TF-IDF vectorizer. Secondly, the Support Vector Machine (SVM) model is utilized to detect and classify the hate speech texts made in the Arabic language. Lastly, the CEHO approach is employed for fine-tuning the parameters involved in SVM. This CEHO approach is developed by combining the chaotic functions with the classical EHO algorithm. The design of the CEHO algorithm for parameter tuning shows the novelty of the work. A widespread experimental analysis was executed to validate the enhanced performance of the proposed CEHOML-HSD approach. The comparative study outcomes established the supremacy of the proposed CEHOML-HSD model over other approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Deer Hunting Optimization with Deep Learning Enabled Emotion Classification on English Twitter Data.
- Author
-
Motwakel, Abdelwahed, Alshahrani, Hala J., Alzahrani, Jaber S., Yafoz, Ayman, Mohsen, Heba, Yaseen, Ishfaq, Abdelmageed, Amgad Atta, and Eldesouki, Mohamed I.
- Subjects
DEEP learning ,ARTIFICIAL neural networks ,MACHINE learning ,ARTIFICIAL intelligence ,NATURAL language processing - Abstract
Currently, individuals use online social media, namely Facebook or Twitter, for sharing their thoughts and emotions. Detection of emotions on social networking sites' finds useful in several applications in social welfare, commerce, public health, and so on. Emotion is expressed in several means, like facial and speech expressions, gestures, and written text. Emotion recognition in a text document is a content-based classification problem that includes notions from deep learning (DL) and natural language processing (NLP) domains. This article proposes a DeerHuntingOptimizationwithDeep BeliefNetwork Enabled Emotion Classification (DHODBN-EC) on English Twitter Data in this study. The presented DHODBN-ECmodel aims to examine the existence of distinct emotion classes in tweets. At the introductory level, the DHODBN-EC technique pre-processes the tweets at different levels. Besides, the word2vec feature extraction process is applied to generate the word embedding process. For emotion classification, the DHODBN-EC model utilizes the DBN model, which helps to determine distinct emotion class labels. Lastly, the DHO algorithm is leveraged for optimal hyperparameter adjustment of the DBN technique. An extensive range of experimental analyses can be executed to demonstrate the enhanced performance of the DHODBN-EC approach. A comprehensive comparison study exhibited the improvements of the DHODBN-EC model over other approaches with increased accuracy of 96.67%. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
17. Chaotic Mapping Lion Optimization Algorithm-Based Node Localization Approach for Wireless Sensor Networks.
- Author
-
Motwakel, Abdelwahed, Hashim, Aisha Hassan Abdalla, Alamro, Hayam, Alqahtani, Hamed, Alotaibi, Faiz Abdullah, and Sayed, Ahmed
- Subjects
- *
WIRELESS sensor networks , *WIRELESS localization , *POSITION sensors , *INDUSTRIAL robots , *GEOGRAPHICAL positions , *LOCALIZATION (Mathematics) - Abstract
Wireless Sensor Networks (WSNs) contain several small, autonomous sensor nodes (SNs) able to process, transfer, and wirelessly sense data. These networks find applications in various domains like environmental monitoring, industrial automation, healthcare, and surveillance. Node Localization (NL) is a major problem in WSNs, aiming to define the geographical positions of sensors correctly. Accurate localization is essential for distinct WSN applications comprising target tracking, environmental monitoring, and data routing. Therefore, this paper develops a Chaotic Mapping Lion Optimization Algorithm-based Node Localization Approach (CMLOA-NLA) for WSNs. The purpose of the CMLOA-NLA algorithm is to define the localization of unknown nodes based on the anchor nodes (ANs) as a reference point. In addition, the CMLOA is mainly derived from the combination of the tent chaotic mapping concept into the standard LOA, which tends to improve the convergence speed and precision of NL. With extensive simulations and comparison results with recent localization approaches, the effectual performance of the CMLOA-NLA technique is illustrated. The experimental outcomes demonstrate considerable improvement in terms of accuracy as well as efficiency. Furthermore, the CMLOA-NLA technique was demonstrated to be highly robust against localization error and transmission range with a minimum average localization error of 2.09%. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
18. Improved Artificial Ecosystem Optimizer with Deep-Learning-Based Insect Detection and Classification for Agricultural Sector.
- Author
-
Aljebreen, Mohammed, Mengash, Hanan Abdullah, Kouki, Fadoua, and Motwakel, Abdelwahed
- Abstract
The agricultural industry has the potential to meet the increasing food production requirements and supply nutritious and healthy food products. Since the Internet of Things (IoT) phenomenon has achieved considerable growth in recent years, IoT-based systems have been established for pest detection so as to mitigate the loss of crops and reduce serious damage by employing pesticides. In the event of pest attack, the detection of crop insects is a tedious process for farmers since a considerable proportion of crop yield is affected and the quality of pest detection is diminished. Based on morphological features, conventional insect detection is an option, although the process has a disadvantage, i.e., it necessitates highly trained taxonomists to accurately recognize the insects. In recent times, automated detection of insect categories has become a complex problem and has gained considerable interest since it is mainly carried out by agriculture specialists. Advanced technologies in deep learning (DL) and machine learning (ML) domains have effectively reached optimum performance in terms of pest detection and classification. Therefore, the current research article focuses on the design of the improved artificial-ecosystem-based optimizer with deep-learning-based insect detection and classification (IAEODL-IDC) technique in IoT-based agricultural sector. The purpose of the proposed IAEODL-IDC technique lies in the effectual identification and classification of different types of insects. In order to accomplish this objective, IoT-based sensors are used to capture the images from the agricultural environment. In addition to this, the proposed IAEODL-IDC method applies the median filtering (MF)-based noise removal process. The IAEODL-IDC technique uses the MobileNetv2 approach as well as for feature vector generation. The IAEO system is utilized for optimal hyperparameter tuning of the MobileNetv2 approach. Furthermore, the gated recurrent unit (GRU) methodology is exploited for effective recognition and classification of insects. An extensive range of simulations were conducted to exhibit the improved performance of the proposed IAEODL-IDC methodology. The simulation results validated the remarkable results of the IAEODL-IDC algorithm with recent systems. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
19. Predictive Multimodal Deep Learning-Based Sustainable Renewable and Non-Renewable Energy Utilization.
- Author
-
Motwakel, Abdelwahed, Obayya, Marwa, Nemri, Nadhem, Tarmissi, Khaled, Mohsen, Heba, Rizwanulla, Mohammed, Yaseen, Ishfaq, and Zamani, Abu Sarwar
- Subjects
DEEP learning ,RENEWABLE energy sources ,ARTIFICIAL intelligence ,ENERGY demand management ,COMPUTER simulation - Abstract
Recently, renewable energy (RE) has become popular due to its benefits, such as being inexpensive, low-carbon, ecologically friendly, steady, and reliable. The RE sources are gradually combined with non-renewable energy (NRE) sources into electric grids to satisfy energy demands. Since energy utilization is highly related to national energy policy, energy prediction using artificial intelligence (AI) and deep learning (DL) based models can be employed for energy prediction on RE and NRE power resources. Predicting energy consumption of RE and NRE sources using effective models becomes necessary. With this motivation, this study presents a new multimodal fusionbased predictive tool for energy consumption prediction (MDLFM-ECP) of RE and NRE power sources. Actual data may influence the prediction performance of the results in prediction approaches. The proposed MDLFMECP technique involves pre-processing, fusion-based prediction, and hyperparameter optimization. In addition, the MDLFM-ECP technique involves the fusion of four deep learning (DL) models, namely long short-termmemory (LSTM), bidirectional LSTM (Bi-LSTM), deep belief network (DBN), and gated recurrent unit (GRU). Moreover, the chaotic cat swarm optimization (CCSO) algorithm is applied to tune the hyperparameters of the DL models. The design of the CCSO algorithm for optimal hyperparameter tuning of the DL models, showing the novelty of the work. A series of simulations took place to validate the superior performance of the proposed method, and the simulation outcome emphasized the improved results of the MDLFM-ECP technique over the recent approaches with minimum overall mean absolute percentage error of 3.58%. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
20. Improved Metaheuristics with Deep Learning Enabled Movie Review Sentiment Analysis.
- Author
-
Motwakel, Abdelwahed, Alotaibi, Najm, Alabdulkreem, Eatedal, Alshahrani, Hussain, Elfaki, Mohamed Ahmed, Nour, Mohamed K., Marzouk, Radwa, and Othman, Mahmoud
- Subjects
DEEP learning ,METAHEURISTIC algorithms ,NATURAL language processing ,STOCK exchanges ,MACHINE learning - Abstract
Sentiment Analysis (SA) of natural language text is not only a challenging process but also gains significance in various Natural Language Processing (NLP) applications. The SA is utilized in various applications, namely, education, to improve the learning and teaching processes, marketing strategies, customer trend predictions, and the stock market. Various researchers have applied lexicon-related approaches, Machine Learning (ML) techniques and so on to conduct the SA for multiple languages, for instance, English and Chinese. Due to the increased popularity of the Deep Learning models, the current study used diverse configuration settings of the Convolution Neural Network (CNN) model and conducted SA for Hindi movie reviews. The current study introduces an Effective Improved Metaheuristics with Deep Learning (DL)-Enabled Sentiment Analysis for Movie Reviews (IMDLSA-MR) model. The presented IMDLSA-MR technique initially applies different levels of pre-processing to convert the input data into a compatible format. Besides, the Term Frequency-Inverse Document Frequency (TF-IDF) model is exploited to generate the word vectors from the pre-processed data. The Deep Belief Network (DBN) model is utilized to analyse and classify the sentiments. Finally, the improved Jellyfish Search Optimization (IJSO) algorithm is utilized for optimal fine-tuning of the hyperparameters related to the DBN model, which shows the novelty of the work. Different experimental analyses were conducted to validate the better performance of the proposed IMDLSA-MR model. The comparative study outcomes highlighted the enhanced performance of the proposed IMDLSA-MR model over recent DL models with a maximum accuracy of 98.92%. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. Modified Aquila Optimizer with Stacked Deep Learning-Based Sentiment Analysis of COVID-19 Tweets.
- Author
-
Almasoud, Ahmed S., Alshahrani, Hala J., Hassan, Abdulkhaleq Q. A., Almalki, Nabil Sharaf, and Motwakel, Abdelwahed
- Subjects
DEEP learning ,SENTIMENT analysis ,NATURAL language processing ,INFORMATION technology security ,SUSTAINABILITY ,CITY traffic - Abstract
In recent times, global cities have been transforming from traditional cities to sustainable smart cities. In text sentiment analysis (SA), many people face critical issues namely urban traffic management, urban living quality, urban information security, urban energy usage, urban safety, etc. Artificial intelligence (AI)-based applications play important roles in dealing with these crucial challenges in text SA. In such scenarios, the classification of COVID-19-related tweets for text SA includes using natural language processing (NLP) and machine learning methodologies to classify tweet datasets based on their content. This assists in disseminating relevant information, understanding public sentiment, and promoting sustainable practices in urban areas during this pandemic. This article introduces a modified aquila optimizer with a stacked deep learning-based COVID-19 tweet Classification (MAOSDL-TC) technique for text SA. The presented MAOSDL-TC technique incorporates FastText, an effective and powerful text representation approach used for the generation of word embeddings. Furthermore, the MAOSDL-TC technique utilizes an attention-based stacked bidirectional long short-term memory (ASBiLSTM) model for the classification of sentiments that exist in tweets. To improve the detection results of the ASBiLSTM model, the MAO algorithm is applied for the hyperparameter tuning process. The presented MAOSDL-TC technique is validated on the benchmark tweets dataset. The experimental outcomes implied the promising results of the MAOSDL-TC technique compared to recent models in terms of different measures. This MAOSDL-TC technique improves accuracy and interpretability of sentiment prediction. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
22. Blockchain Assisted Optimal Machine Learning Based Cyberattack Detection and Classification Scheme.
- Author
-
Alohali, Manal Abdullah, Elsadig, Muna, Al-Wesabi, Fahd N., Al Duhayyim, Mesfer, Hilal, Anwer Mustafa, and Motwakel, Abdelwahed
- Subjects
BLOCKCHAINS ,MACHINE learning ,CYBERTERRORISM ,INFORMATION & communication technologies ,INTRUSION detection systems (Computer security) - Abstract
With recent advancements in information and communication technology, a huge volume of corporate and sensitive user data was shared consistently across the network, making it vulnerable to an attack that may be brought some factors under risk: data availability, confidentiality, and integrity. Intrusion Detection Systems (IDS) were mostly exploited in various networks to help promptly recognize intrusions. Nowadays, blockchain (BC) technology has received much more interest as a means to share data without needing a trusted third person. Therefore, this study designs a new Blockchain Assisted Optimal Machine Learning based Cyberattack Detection and Classification (BAOML-CADC) technique. In the BAOML-CADC technique, the major focus lies in identifying cyberattacks. To do so, the presented BAOML-CADC technique applies a thermal equilibrium algorithm-based feature selection (TEA-FS) method for the optimal choice of features. The BAOML-CADC technique uses an extreme learning machine (ELM) model for cyberattack recognition. In addition, a BC-based integrity verification technique is developed to defend against the misrouting attack, showing the innovation of the work. The experimental validation of BAOML-CADC algorithm is tested on a benchmark cyberattack dataset. The obtained values implied the improved performance of the BAOML-CADC algorithm over other techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
23. Parameter Tuned Machine Learning Based Emotion Recognition on Arabic Twitter Data.
- Author
-
Alwayle, Ibrahim M., Al-onazi, Badriyya B., Alzahrani, Jaber S., Alalayah, Khaled M., Alaidarous, Khadija M., Ahmed, Ibrahim Abdulrab, Othman, Mahmoud, and Motwakel, Abdelwahed
- Subjects
MACHINE learning ,ARABIC language ,EMOTION recognition ,SENTIMENT analysis - Abstract
Arabic is one of the most spoken languages across the globe. However, there are fewer studies concerning Sentiment Analysis (SA) in Arabic. In recent years, the detected sentiments and emotions expressed in tweets have received significant interest. The substantial role played by the Arab region in international politics and the global economy has urged the need to examine the sentiments and emotions in the Arabic language. Two common models are available: Machine Learning and lexicon-based approaches to address emotion classification problems. With this motivation, the current research article develops a Teaching and Learning Optimization with Machine Learning Based Emotion Recognition and Classification (TLBOML-ERC) model for Sentiment Analysis on tweets made in the Arabic language. The presented TLBOML-ERC model focuses on recognising emotions and sentiments expressed in Arabic tweets. To attain this, the proposed TLBOMLERC model initially carries out data pre-processing and a Continuous Bag Of Words (CBOW)-based word embedding process. In addition, Denoising Autoencoder (DAE) model is also exploited to categorise different emotions expressed in Arabic tweets. To improve the efficacy of the DAE model, the Teaching and Learning-based Optimization (TLBO) algorithm is utilized to optimize the parameters. The proposed TLBOML-ERC method was experimentally validated with the help of an Arabic tweets dataset. The obtained results show the promising performance of the proposed TLBOML-ERC model on Arabic emotion classification. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
24. Improved Ant Lion Optimizer with Deep Learning Driven Arabic Hate Speech Detection.
- Author
-
Motwakel, Abdelwahed, Al-onazi, Badriyya B., Alzahrani, Jaber S., Alazwari, Sana, Othman, Mahmoud, Zamani, Abu Sarwar, Yaseen, Ishfaq, and Abdelmageed, Amgad Atta
- Subjects
DEEP learning ,HATE speech ,AUTOMATIC speech recognition ,ARABIC language ,MORPHOLOGY (Grammar) - Abstract
Arabic is the world's first language, categorized by its rich and complicated grammatical formats. Furthermore, the Arabic morphology can be perplexing because nearly 10,000 roots and 900 patterns were the basis for verbs and nouns. The Arabic language consists of distinct variations utilized in a community and particular situations. Social media sites are a medium for expressing opinions and social phenomena like racism, hatred, offensive language, and all kinds of verbal violence. Such conduct does not impact particular nations, communities, or groups only, extending beyond such areas into people's everyday lives. This study introduces an Improved Ant Lion Optimizer with Deep Learning Dirven Offensive and Hate Speech Detection (IALODL-OHSD) on Arabic Cross-Corpora. The presented IALODL-OHSD model mainly aims to detect and classify offensive/hate speech expressed on social media. In the IALODL-OHSD model, a threestage process is performed, namely pre-processing, word embedding, and classification. Primarily, data pre-processing is performed to transform the Arabic social media text into a useful format. In addition, the word2vec word embedding process is utilized to produce word embeddings. The attentionbased cascaded long short-term memory (ACLSTM) model is utilized for the classification process. Finally, the IALO algorithm is exploited as a hyperparameter optimizer to boost classifier results. To illustrate a brief result analysis of the IALODL-OHSD model, a detailed set of simulations were performed. The extensive comparison study portrayed the enhanced performance of the IALODL-OHSD model over other approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
25. Optimal Deep Learning Based Ransomware Detection and Classification in the Internet of Things Environment.
- Author
-
Alohali, Manal Abdullah, Elsadig, Muna, Al-Wesabi, Fahd N., Al Duhayyim, Mesfer, Hilal, Anwer Mustafa, and Motwakel, Abdelwahed
- Subjects
DEEP learning ,RANSOMWARE ,INTERNET of things ,INFORMATION sharing ,FEATURE selection - Abstract
With the advent of the Internet of Things (IoT), several devices like sensors nowadays can interact and easily share information. But the IoT model is prone to security concerns as several attackers try to hit the network and make it vulnerable. In such scenarios, security concern is the most prominent. Different models were intended to address these security problems; still, several emergent variants of botnet attacks like Bashlite, Mirai, and Persirai use security breaches. The malware classification and detection in the IoT model is still a problem, as the adversary reliably generates a new variant of IoT malware and actively searches for compromise on the victim devices. This article develops a Sine Cosine Algorithm with Deep Learning based Ransomware Detection and Classification (SCADL-RWDC) method in an IoT environment. In the presented SCADL-RWDCtechnique, the major intention exists in recognizing and classifying ransomware attacks in the IoT platform. The SCADL-RWDC technique uses the SCA feature selection (SCA-FS) model to improve the detection rate. Besides, the SCADL-RWDC technique exploits the hybrid grey wolf optimizer (HGWO) with a gated recurrent unit (GRU) model for ransomware classification. A widespread experimental analysis is performed to exhibit the enhanced ransomware detection outcomes of the SCADL-RWDC technique. The comparison study reported the enhancement of the SCADL-RWDC technique over other models. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
26. Automated Spam Review Detection Using Hybrid Deep Learning on Arabic Opinions.
- Author
-
Alwayle, Ibrahim M., Al-onazi, Badriyya B., Nour, Mohamed K., Alalayah, Khaled M., Alaidarous, Khadija M., Ahmed, Ibrahim Abdulrab, Mehanna, Amal S., and Motwakel, Abdelwahed
- Subjects
DEEP learning ,PRODUCT reviews ,ARABIC language ,ELECTRONIC data processing ,MACHINE learning - Abstract
Online reviews regarding purchasing services or products offered are the main source of users' opinions. To gain fame or profit, generally, spam reviews are written to demote or promote certain targeted products or services. This practice is called review spamming. During the last few years, various techniques have been recommended to solve the problem of spam reviews. Previous spam detection study focuses on English reviews, with a lesser interest in other languages. Spam review detection in Arabic online sources is an innovative topic despite the vast amount of data produced. Thus, this study develops an Automated Spam Review Detection using optimal Stacked Gated Recurrent Unit (SRD-OSGRU) on Arabic Opinion Text. The presented SRD-OSGRU model mainly intends to classify Arabic reviews into two classes: spam and truthful. Initially, the presented SRD-OSGRU model follows different levels of data preprocessing to convert the actual review data into a compatible format. Next, unigram and bigram feature extractors are utilized. The SGRU model is employed in this study to identify and classify Arabic spam reviews. Since the trial-and-error adjustment of hyperparameters is a tedious process, a white shark optimizer (WSO) is utilized, boosting the detection efficiency of the SGRU model. The experimental validation of the SRD-OSGRU model is assessed under two datasets, namely DOSC dataset. An extensive comparison study pointed out the enhanced performance of the SRD-OSGRU model over other recent approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
27. Modified Dragonfly Optimization with Machine Learning Based Arabic Text Recognition.
- Author
-
Al-onazi, Badriyya B., Alotaibi, Najm, Alzahrani, Jaber S., Alshahrani, Hussain, Elfaki, Mohamed Ahmed, Marzouk, Radwa, Othman, Mahmoud, and Motwakel, Abdelwahed
- Subjects
NATURAL language processing ,TEXT recognition ,MACHINE learning ,CONVOLUTIONAL neural networks ,LONG short-term memory ,DEEP learning - Abstract
Text classification or categorization is the procedure of automatically tagging a textual document with most related labels or classes. When the number of labels is limited to one, the task becomes single-label text categorization. The Arabic texts include unstructured information also like English texts, and that is understandable for machine learning (ML) techniques, the text is changed and demonstrated by numerical value. In recent times, the dominant method for natural language processing (NLP) tasks is recurrent neural network (RNN), in general, long short term memory (LSTM) and convolutional neural network (CNN). Deep learning (DL) models are currently presented for deriving a massive amount of text deep features to an optimum performance from distinct domains such as text detection, medical image analysis, and so on. This paper introduces a Modified Dragonfly Optimization with Extreme Learning Machine for Text Representation and Recognition (MDFO-EMTRR) model on Arabic Corpus. The presented MDFO-EMTRR technique mainly concentrates on the recognition and classification of the Arabic text. To achieve this, the MDFO-EMTRR technique encompasses data pre-processing to transform the input data into compatible format. Next, the ELM model is utilized for the representation and recognition of the Arabic text. At last, the MDFO algorithm was exploited for optimal tuning of the parameters related to the ELM method and thereby accomplish enhanced classifier results. The experimental result analysis of the MDFO-EMTRR system was performed on benchmark datasets and attained maximum accuracy of 99.74%. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
28. Improved Chameleon Swarm Optimization-Based Load Scheduling for IoT-Enabled Cloud Environment.
- Author
-
Hamza, Manar Ahmed, Al-Otaibi, Shaha, Althahabi, Sami, Alzahrani, Jaber S., Mohamed, Abdullah, Motwakel, Abdelwahed, Zamani, Abu Sarwar, and Eldesouki, Mohamed I.
- Subjects
INTERNET of things ,CLOUD computing ,ELECTRONIC commerce ,ENERGY consumption ,METAHEURISTIC algorithms - Abstract
Internet of things (IoT) and cloud computing (CC) becomes widespread in different application domains such as business, e-commerce, healthcare, etc. The recent developments of IoT technology have led to an increase in large amounts of data from various sources. In IoT enabled cloud environment, load scheduling remains a challenging process which is applied for ensuring network stability with maximum resource utilization. The load scheduling problem was regarded as an optimization problem that is solved by metaheuristics. In this view, this study develops a new Circle Chaotic Chameleon Swarm Optimization based Load Scheduling (C3SOA-LS) technique for IoT enabled cloud environment. The proposed C3SOA-LS technique intends to effectually schedule the tasks and balance the load uniformly in such a way that maximum resource utilization can be accomplished. Besides, the presented C3SOA-LS model involves the design of circle chaotic mapping (CCM) with the traditional chameleon swarm optimization (CSO) algorithm for improving the exploration process, shows the novelty of the work. The proposed C3SOA-LS model computes an objective with the minimization of energy consumption and makespan. The experimental outcome implied that the C3SOA-LS model has showcased improved performance and uniformly balances the load over other approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
29. Artificial Algae Optimization with Deep Belief Network Enabled Ransomware Detection in IoT Environment.
- Author
-
Al Duhayyim, Mesfer, Mohamed, Heba G., Alrowais, Fadwa, Al-Wesabi, Fahd N., Hilal, Anwer Mustafa, and Motwakel, Abdelwahed
- Subjects
INTERNET of things ,DEEP learning ,MACHINE learning ,ARTIFICIAL neural networks ,INTERNET security - Abstract
The Internet of Things (IoT) has gained more popularity in research because of its large-scale challenges and implementation. But security was the main concern when witnessing the fast development in its applications and size. It was a dreary task to independently set security systems in every IoT gadget and upgrade them according to the newer threats. Additionally, machine learning (ML) techniques optimally use a colossal volume of data generated by IoT devices. Deep Learning (DL) related systems were modelled for attack detection in IoT. But the current security systems address restricted attacks and can be utilized outdated datasets for evaluations. This study develops an Artificial Algae Optimization Algorithm with Optimal Deep Belief Network (AAA-ODBN) Enabled Ransomware Detection in an IoT environment. The presented AAAODBN technique mainly intends to recognize and categorize ransomware in the IoT environment. The presented AAA-ODBN technique follows a three-stage process: feature selection, classification, and parameter tuning. In the first stage, the AAA-ODBN technique uses AAA based feature selection (AAA-FS) technique to elect feature subsets. Secondly, the AAA-ODBN technique employs the DBN model for ransomware detection. At last, the dragonfly algorithm (DFA) is utilized for the hyperparameter tuning of the DBN technique. A sequence of simulations is implemented to demonstrate the improved performance of the AAA-ODBN algorithm. The experimental values indicate the significant outcome of the AAA-ODBN model over other models. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
30. Convolutional Deep Belief Network Based Short Text Classification on Arabic Corpus.
- Author
-
Motwakel, Abdelwahed, Al-onazi, Badriyya B., Alzahrani, Jaber S., Marzouk, Radwa, Aziz, Amira Sayed A., Zamani, Abu Sarwar, Yaseen, Ishfaq, and Abdelmageed, Amgad Atta
- Subjects
CONVOLUTIONAL neural networks ,PARTICLE swarm optimization ,INTERNET users ,HISTORICAL linguistics ,DATA mining - Abstract
With a population of 440 million, Arabic language users form the rapidly growing language group on the web in terms of the number of Internet users. 11 million monthly Twitter users were active and posted nearly 27.4 million tweets every day. In order to develop a classification system for the Arabic language there comes a need of understanding the syntactic framework of the words thereby manipulating and representing the words for making their classification effective. In this view, this article introduces a Dolphin Swarm Optimization with Convolutional Deep Belief Network for Short Text Classification (DSOCDBNSTC) model on Arabic Corpus. The presented DSOCDBN-STC model majorly aims to classify Arabic short text in social media. The presented DSOCDBNSTC model encompasses preprocessing and word2vec word embedding at the preliminary stage. Besides, the DSOCDBN-STC model involves CDBN based classification model for Arabic short text. At last, the DSO technique can be exploited for optimal modification of the hyperparameters related to the CDBN method. To establish the enhanced performance of the DSOCDBN-STC model, a wide range of simulations have been performed. The simulation results confirmed the supremacy of the DSOCDBN-STC model over existing models with improved accuracy of 99.26%. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
31. Anas platyrhynchos optimizer with deep transfer learning-based gastric cancer classification on endoscopic images.
- Author
-
Maashi, Mashael S., Ali, Yasser Ali Reyad, Motwakel, Abdelwahed, Aziz, Amira Sayed A., Hamza, Manar Ahmed, and Abdelmageed, Amgad Atta
- Subjects
DEEP learning ,STOMACH cancer ,ENDOSCOPY ,COMPUTER vision ,DIAGNOSTIC imaging - Abstract
Gastric Cancer (GC) has been identified as the world's fifth most general tumor. So, it is important to diagnose the GC at initial stages itself to save the lives. Histopathological analysis remains the gold standard for accurate diagnosis of the disease. Though Computer-Aided Diagnostic approaches are prevalently applied in recent years for the diagnosis of diseases, it is challenging to apply in this case, due to the lack of accessible gastric histopathological image databases. With a rapid progression in the Computer Vision (CV) technologies, particularly, the emergence of medicinal image classifiers, it has become feasible to examine all the types of electron micrographs in a rapid and an effective manner. Therefore, the current research article presents an Anas Platyrhynchos Optimizer with Deep Learning-based Gastric Cancer Classification (APODL-GCC) method for the classification of GC using the endoscopic images. The aim of the proposed APODL-GCC method is to identify the presence of GC with the help of CV and Deep Learning concepts. Primarily, the APODL-GCC technique employs a contrast enhancement technique. Next, the feature extraction process is performed using a neural architectural search network model to generate a collection of feature vectors. For hyperparameter optimization, the Anas Platyrhynchos Optimizer (APO) algorithm is used which enhances the classification performance. Finally, the GC classification process is performed using the Deep Belief Network method. The proposed APODL-GCC technique was simulated using medical images and the experimental results established that the APODL-GCC technique accomplishes enhanced performance over other models. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
32. Enhanced Crow Search with Deep Learning-Based Cyberattack Detection in SDN-IoT Environment.
- Author
-
Motwakel, Abdelwahed, Alrowais, Fadwa, Tarmissi, Khaled, Marzouk, Radwa, Mohamed, Abdullah, Zamani, Abu Sarwar, Yaseen, Ishfaq, and Eldesouki, Mohamed I.
- Subjects
DEEP learning ,CYBERTERRORISM ,SOFTWARE-defined networking ,DATA security failures ,ALGORITHMS ,SEARCH algorithms - Abstract
The paradigm shift towards the Internet of Things (IoT) phenomenon and the rise of edge-computing models provide massive potential for several upcoming IoT applications like smart grid, smart energy, smart home, smart health and smart transportation services. However, it also provides a sequence of novel cyber-security issues. Although IoT networks provide several advantages, the heterogeneous nature of the network and the wide connectivity of the devices make the network easy for cyber-attackers. Cyberattacks result in financial loss and data breaches for organizations and individuals. So, it becomes crucial to secure the IoT environment from such cyberattacks. With this motivation, the current study introduces an effectual Enhanced Crow Search Algorithm with Deep Learning-Driven Cyberattack Detection (ECSADL-CAD) model for the Software-Defined Networking (SDN)-enabled IoT environment. The presented ECSADL-CAD approach aims to identify and classify the cyberattacks in the SDN-enabled IoT environment. To attain this, the ECSADL-CAD model initially pre-processes the data. In the presented ECSADL-CAD model, the Reinforced Deep Belief Network (RDBN) model is employed for attack detection. At last, the ECSA-based hyperparameter tuning process gets executed to boost the overall classification outcomes. A series of simulations were conducted to validate the improved outcomes of the proposed ECSADL-CAD model. The experimental outcomes confirmed the superiority of the proposed ECSADLCAD model over other existing methodologies. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
33. Graph Convolutional Neural Network Based Malware Detection in IoT-Cloud Environment.
- Author
-
Alsubaei, Faisal S., Alshahrani, Haya Mesfer, Tarmissi, Khaled, and Motwakel, Abdelwahed
- Subjects
CONVOLUTIONAL neural networks ,MALWARE ,MOBILE operating systems - Abstract
Cybersecurity has become the most significant research area in the domain of the Internet of Things (IoT) owing to the ever-increasing number of cyberattacks. The rapid penetration of Android platforms in mobile devices has made the detection of malware attacks a challenging process. Furthermore, Android malware is increasing on a daily basis. So, precise malware detection analytical techniques need a large number of hardware resources that are signifi- cantly resource-limited for mobile devices. In this research article, an optimal Graph Convolutional Neural Network-based Malware Detection and classification (OGCNN-MDC) model is introduced for an IoT-cloud environment. The proposed OGCNN-MDC model aims to recognize and categorize malware occurrences in IoT-enabled cloud platforms. The presented OGCNN-MDC model has three stages in total, such as data pre-processing, malware detection and parameter tuning. To detect and classify the malware, the GCNN model is exploited in this work. In order to enhance the overall efficiency of the GCNN model, the Group Mean-based Optimizer (GMBO) algorithm is utilized to appropriately adjust the GCNN parameters, and this phenomenon shows the novelty of the current study. A widespread experimental analysis was conducted to establish the superiority of the proposed OGCNN-MDC model. A comprehensive comparison study was conducted, and the outcomes highlighted the supreme performance of the proposed OGCNN-MDC model over other recent approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
34. Improved Fruitfly Optimization with Stacked Residual Deep Learning Based Email Classification.
- Author
-
Alshahrani, Hala J., Tarmissi, Khaled, Yafoz, Ayman, Mohamed, Abdullah, Motwakel, Abdelwahed, Yaseen, Ishfaq, Abdelmageed, Amgad Atta, and Mahzari, Mohammad
- Subjects
SPAM email ,DEEP learning ,RECURRENT neural networks ,CATEGORIZATION (Linguistics) ,AUTOMATIC classification ,APPLIED linguistics - Abstract
Applied linguistics means a wide range of actions which include addressing a few language-based problems or solving some language-based concerns. Emails stay in the leading positions for business as well as personal use. This popularity grabs the interest of individuals with malevolent intentions--phishing and spam email assaults. Email filtering mechanisms were developed incessantly to follow unwanted, malicious content advancement to protect the end-users. But prevailing solutions were focused on phishing email filtering and spam and whereas email labelling and analysis were not fully advanced. Thus, this study provides a solution related to email message body text automatic classification into phishing and email spam. This paper presents an Improved Fruitfly Optimization with Stacked Residual Recurrent Neural Network (IFFO-SRRNN) based on Applied Linguistics for Email Classification. The presented IFFO-SRRNN technique examines the intrinsic features of email for the identification of spam emails. At the preliminary level, the IFFO-SRRNN model follows the email pre-processing stage to make it compatible with further computation. Next, the SRRNN method can be useful in recognizing and classifying spam emails. As hyperparameters of the SRRNN model need to be effectually tuned, the IFFO algorithm can be utilized as a hyperparameter optimizer. To investigate the effectual email classification results of the IFFO-SRDL technique, a series of simulations were taken placed on public datasets, and the comparison outcomes highlight the enhancements of the IFFO-SRDL method over other recent approaches with an accuracy of 98.86%. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
35. Political Optimizer with Probabilistic Neural Network-Based Arabic Comparative Opinion Mining.
- Author
-
Alotaibi, Najm, Al-onazi, Badriyya B., Nour, Mohamed K., Mohamed, Abdullah, Motwakel, Abdelwahed, Mohammed, Gouse Pasha, Yaseen, Ishfaq, and Rizwanullah, Mohammed
- Subjects
SENTIMENT analysis ,ARABIC language ,SOCIAL media ,ENGLISH language ,SOCIAL context - Abstract
Opinion Mining (OM) studies in Arabic are limited though it is one of the most extensively-spoken languages worldwide. Though the interest in OM studies in the Arabic language is growing among researchers, it needs a vast number of investigations due to the unique morphological principles of the language. Arabic OM studies experience multiple challenges owing to the poor existence of language sources and Arabic-specific linguistic features. The comparativeOMstudies in the English language are wide and novel. But, comparative OM studies in the Arabic language are yet to be established and are still in a nascent stage. The unique features of the Arabic language make it essential to expand the studies regarding the Arabic text. It contains unique features such as diacritics, elongation, inflection and word length. The current study proposes a Political Optimizer with Probabilistic Neural Networkbased Comparative Opinion Mining (POPNN-COM) model for the Arabic text. The proposed POPNN-COM model aims to recognize comparative and non-comparative texts in Arabic in the context of social media. Initially, the POPNN-COM model involves different levels of data pre-processing to transform the input data into a useful format. Then, the pre-processed data is fed into the PNN model for classification and recognition of the data under different class labels. At last, the PO algorithm is employed for finetuning the parameters involved in this model to achieve enhanced results. The proposed POPNN-COM model was experimentally validated using two standard datasets, and the outcomes established the promising performance of the proposed POPNN-COM method over other recent approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
36. Sine Cosine Optimization with Deep Learning-Based Applied Linguistics for Sentiment Analysis on COVID-19 Tweets.
- Author
-
Motwakel, Abdelwahed, Alshahrani, Hala J., Hassan, Abdulkhaleq Q. A., Tarmissi, Khaled, Mehanna, Amal S., Yaseen, Ishfaq, Abdelmageed, Amgad Atta, and Mahzari, Mohammad
- Subjects
SOCIAL media ,SENTIMENT analysis ,DEEP learning ,LINGUISTIC analysis ,COVID-19 pandemic ,MICROBLOGS ,COVID-19 - Abstract
Applied linguistics is an interdisciplinary domain which identifies, investigates, and offers solutions to language-related real-life problems. The new coronavirus disease, otherwise known as Coronavirus disease (COVID19), has severely affected the everyday life of people all over the world. Specifically, since there is insufficient access to vaccines and no straight or reliable treatment for coronavirus infection, the country has initiated the appropriate preventive measures (like lockdown, physical separation, and masking) for combating this extremely transmittable disease. So, individuals spent more time on online social media platforms (i.e., Twitter, Facebook, Instagram, LinkedIn, and Reddit) and expressed their thoughts and feelings about coronavirus infection. Twitter has become one of the popular social media platforms and allows anyone to post tweets. This study proposes a sine cosine optimization with bidirectional gated recurrent unit-based sentiment analysis (SCOBGRU-SA) on COVID-19 tweets. The SCOBGRU-SA technique aimed to detect and classify the various sentiments in Twitter data during the COVID-19 pandemic. The SCOBGRU-SA technique follows data pre-processing and the Fast-Text word embedding process to accomplish this. Moreover, the BGRU model is utilized to recognise and classify sentiments present in the tweets. Furthermore, the SCO algorithm is exploited for tuning the BGRU method’s hyperparameter, which helps attain improved classification performance. The experimental validation of the SCOBGRUSA technique takes place using a benchmark dataset, and the results signify its promising performance compared to other DL models. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
37. Spotted Hyena Optimizer with Deep Learning Driven Cybersecurity for Social Networks.
- Author
-
Hilal, Anwer Mustafa, Hashim, Aisha Hassan Abdalla, Mohamed, Heba G., Alharbi, Lubna A., Nour, Mohamed K., Mohamed, Abdullah, Almasoud, Ahmed S., and Motwakel, Abdelwahed
- Subjects
DEEP learning ,INTERNET security ,SOCIAL networks ,CYBERBULLYING ,MACHINE learning - Abstract
Recent developments on Internet and social networking have led to the growth of aggressive language and hate speech. Online provocation, abuses, and attacks are widely termed cyberbullying (CB). The massive quantity of user generated content makes it difficult to recognize CB. Current advancements in machine learning (ML), deep learning (DL), and natural language processing (NLP) tools enable to detect and classify CB in social networks. In this view, this study introduces a spotted hyena optimizer with deep learning driven cybersecurity (SHODLCS) model for OSN. The presented SHODLCS model intends to accomplish cybersecurity from the identification of CB in the OSN. For achieving this, the SHODLCS model involves data pre-processing and TF-IDF based feature extraction. In addition, the cascaded recurrent neural network (CRNN) model is applied for the identification and classification of CB. Finally, the SHO algorithm is exploited to optimally tune the hyperparameters involved in the CRNN model and thereby results in enhanced classifier performance. The experimental validation of the SHODLCS model on the benchmark dataset portrayed the better outcomes of the SHODLCS model over the recent approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
38. Differential Evolution with Arithmetic Optimization Algorithm Enabled Multi-Hop Routing Protocol.
- Author
-
Hamza, Manar Ahmed, Alshahrani, Haya Mesfer, Dhahbi, Sami, Nour, Mohamed K., Al Duhayyim, Mesfer, El Din, ElSayed M. Tag, Yaseen, Ishfaq, and Motwakel, Abdelwahed
- Subjects
WIRELESS sensor networks ,ENERGY consumption ,DIFFERENTIAL evolution ,COMPUTER networks ,COMPARATIVE studies - Abstract
Wireless Sensor Networks (WSN) has evolved into a key technology for ubiquitous living and the domain of interest has remained active in research owing to its extensive range of applications. In spite of this, it is challenging to design energy-efficient WSN. The routing approaches are leveraged to reduce the utilization of energy and prolonging the lifespan of network. In order to solve the restricted energy problem, it is essential to reduce the energy utilization of data, transmitted from the routing protocol and improve network development. In this background, the current study proposes a novel Differential Evolution with Arithmetic Optimization Algorithm Enabled Multi-hop Routing Protocol (DEAOA-MHRP) for WSN. The aim of the proposed DEAOA-MHRP model is select the optimal routes to reach the destination in WSN. To accomplish this, DEAOA-MHRP model initially integrates the concepts of Different Evolution (DE) and Arithmetic Optimization Algorithms (AOA) to improve convergence rate and solution quality. Besides, the inclusion of DE in traditional AOA helps in overcoming local optima problems. In addition, the proposed DEAOA-MRP technique derives a fitness function comprising two input variables such as residual energy and distance. In order to ensure the energy efficient performance of DEAOA-MHRP model, a detailed comparative study was conducted and the results established its superior performance over recent approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
39. Energy-Efficient Routing Using Novel Optimization with Tabu Techniques for Wireless Sensor Network.
- Author
-
Hamza, Manar Ahmed, Hashim, Aisha Hassan Abdalla, Elkamchouchi, Dalia H., Nemri, Nadhem, Alzahrani, Jaber S., Aziz, Amira Sayed A., Ibrahim, Mnahel Ahmed, and Motwakel, Abdelwahed
- Subjects
WIRELESS sensor networks ,ENERGY consumption ,PARTICLE swarm optimization ,TABU search algorithm ,COMPUTER networks - Abstract
Wireless Sensor Network (WSN) consists of a group of limited energy source sensors that are installed in a particular region to collect data from the environment. Designing the energy-efficient data collection methods in largescale wireless sensor networks is considered to be a difficult area in the research. Sensor node clustering is a popular approach for WSN. Moreover, the sensor nodes are grouped to form clusters in a cluster-based WSN environment. The battery performance of the sensor nodes is likewise constrained. As a result, the energy efficiency of WSNs is critical. In specific, the energy usage is influenced by the loads on the sensor node as well as it ranges from the Base Station (BS). Therefore, energy efficiency and load balancing are very essential in WSN. In the proposed method, a novel Grey Wolf Improved Particle Swarm Optimization with Tabu Search Techniques (GW-IPSO-TS) was used. The selection of Cluster Heads (CHs) and routing path of every CH from the base station is enhanced by the proposed method. It provides the best routing path and increases the lifetime and energy efficiency of the network. End-to-end delay and packet loss rate have also been improved. The proposed GW-IPSO-TS method enhances the evaluation of alive nodes, dead nodes, network survival index, convergence rate, and standard deviation of sensor nodes. Compared to the existing algorithms, the proposed method outperforms better and improves the lifetime of the network. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
40. Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model.
- Author
-
Asiri, Mashael M., Mohamed, Heba G., Nour, Mohamed K., Al Duhayyim, Mesfer, Aziz, Amira Sayed A., Motwakel, Abdelwahed, Zamani, Abu Sarwar, and Eldesouki, Mohamed I.
- Subjects
INTERNET of things ,CYBERTERRORISM ,METAHEURISTIC algorithms ,DEEP learning ,PARTICLE swarm optimization - Abstract
Due to exponential increase in smart resource limited devices and high speed communication technologies, Internet of Things (IoT) have received significant attention in different application areas. However, IoT environment is highly susceptible to cyber-attacks because of memory, processing, and communication restrictions. Since traditional models are not adequate for accomplishing security in the IoT environment, the recent developments of deep learning (DL) models find beneficial. This study introduces novel hybrid metaheuristics feature selection with stacked deep learning enabled cyber-attack detection (HMFS-SDLCAD) model. The major intention of the HMFS-SDLCAD model is to recognize the occurrence of cyberattacks in the IoT environment. At the preliminary stage, data pre-processing is carried out to transform the input data into useful format. In addition, salp swarm optimization based on particle swarm optimization (SSOPSO) algorithm is used for feature selection process. Besides, stacked bidirectional gated recurrent unit (SBiGRU) model is utilized for the identification and classification of cyberattacks. Finally, whale optimization algorithm (WOA) is employed for optimal hyperparameter optimization process. The experimental analysis of the HMFS-SDLCAD model is validated using benchmark dataset and the results are assessed under several aspects. The simulation outcomes pointed out the improvements of the HMFS-SDLCAD model over recent approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
41. Competitive Multi-Verse Optimization with Deep Learning Based Sleep Stage Classification.
- Author
-
Hilal, Anwer Mustafa, Al-Rasheed, Amal, Alzahrani, Jaber S., Eltahir, Majdy M., Al Duhayyim, Mesfer, Salem, Nermin M., Yaseen, Ishfaq, and Motwakel, Abdelwahed
- Subjects
SLEEP stages ,DEEP learning ,MACHINE learning ,ELECTROENCEPHALOGRAPHY ,COMPUTER simulation - Abstract
Sleep plays a vital role in optimum working of the brain and the body. Numerous people suffer from sleep-oriented illnesses like apnea, insomnia, etc. Sleep stage classification is a primary process in the quantitative examination of polysomnographic recording. Sleep stage scoring is mainly based on experts' knowledge which is laborious and time consuming. Hence, it can be essential to design automated sleep stage classification model using machine learning (ML) and deep learning (DL) approaches. In this view, this study focuses on the design of Competitive Multi-verse Optimization with Deep Learning Based Sleep Stage Classification (CMVODL-SSC) model using Electroencephalogram (EEG) signals. The proposed CMVODL-SSC model intends to effectively categorize different sleep stages on EEG signals. Primarily, data pre-processing is performed to convert the actual data into useful format. Besides, a cascaded long short term memory (CLSTM) model is employed to perform classification process. At last, the CMVO algorithm is utilized for optimally tuning the hyperparameters involved in the CLSTM model. In order to report the enhancements of the CMVODL-SSC model, a wide range of simulations was carried out and the results ensured the better performance of the CMVODL-SSC model with average accuracy of 96.90%. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
42. Political Optimizer with Deep Learning-Enabled Tongue Color Image Analysis Model.
- Author
-
Hilal, Anwer Mustafa, Alabdulkreem, Eatedal, Alzahrani, Jaber S., Eltahir, Majdy M., Eldesouki, Mohamed I., Yaseen, Ishfaq, Motwakel, Abdelwahed, and Marzouk, Radwa
- Subjects
COLOR image processing ,DEEP learning ,SUPPORT vector machines ,IMAGE quality analysis ,DIAGNOSTIC imaging - Abstract
Biomedical image processing is widely utilized for disease detection and classification of biomedical images. Tongue color image analysis is an effective and non-invasive tool for carrying out secondary detection at anytime and anywhere. For removing the qualitative aspect, tongue images are quantitatively inspected, proposing a novel disease classification model in an automated way is preferable. This article introduces a novel political optimizer with deep learning enabled tongue color image analysis (PODL-TCIA) technique. The presented PODL-TCIA model purposes to detect the occurrence of the disease by examining the color of the tongue. To attain this, the PODL-TCIA model initially performs image pre-processing to enhance medical image quality. Followed by, Inception with ResNet-v2 model is employed for feature extraction. Besides, political optimizer (PO) with twin support vector machine (TSVM) model is exploited for image classification process, shows the novelty of the work. The design of PO algorithm assists in the optimal parameter selection of the TSVM model. For ensuring the enhanced outcomes of the PODL-TCIA model, a wide-ranging experimental analysis was applied and the outcomes reported the betterment of the PODL-TCIA model over the recent approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
43. Optimal Wavelet Neural Network-Based Intrusion Detection in Internet of Things Environment.
- Author
-
Mohamed, Heba G., Alrowais, Fadwa, Al-Hagery, Mohammed Abdullah, Al Duhayyim, Mesfer, Hilal, Anwer Mustafa, and Motwakel, Abdelwahed
- Subjects
INTERNET of things ,INTRUSION detection systems (Computer security) ,OPTIMIZATION algorithms ,SUBSET selection ,FEATURE selection ,MACHINE learning - Abstract
As the Internet of Things (IoT) endures to develop, a huge count of data has been created. An IoT platform is rather sensitive to security challenges as individual data can be leaked, or sensor data could be used to cause accidents. As typical intrusion detection system (IDS) studies can be frequently designed for working well on databases, it can be unknown if they intend to work well in altering network environments. Machine learning (ML) techniques are depicted to have a higher capacity at assisting mitigate an attack on IoT device and another edge system with reasonable accuracy. This article introduces a new Bird Swarm Algorithm with Wavelet Neural Network for Intrusion Detection (BSAWNN-ID) in the IoT platform. The main intention of the BSAWNN-ID algorithm lies in detecting and classifying intrusions in the IoT platform. The BSAWNN-ID technique primarily designs a feature subset selection using the coyote optimization algorithm (FSS-COA) to attain this. Next, to detect intrusions, the WNN model is utilized. At last, the WNN parameters are optimally modified by the use of BSA. A widespread experiment is performed to depict the better performance of the BSAWNN-ID technique. The resultant values indicated the better performance of the BSAWNN-ID technique over other models, with an accuracy of 99.64% on the UNSW-NB15 dataset. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
44. Arabic Sign Language Gesture Classification Using Deer Hunting Optimization with Machine Learning Model.
- Author
-
Al-onazi, Badriyya B., Nour, Mohamed K., Alshahran, Hussain, Elfaki, Mohamed Ahmed, Alnfiai, Mrim M., Marzouk, Radwa, Othman, Mahmoud, Sharif, Mahir M., and Motwakel, Abdelwahed
- Subjects
SIGN language ,ARTIFICIAL neural networks ,DEER hunting ,MACHINE learning ,ARABIC language ,HEARING aids ,OPTICAL character recognition - Abstract
Sign language includes the motion of the arms and hands to communicate with people with hearing disabilities. Several models have been available in the literature for sign language detection and classification for enhanced outcomes. But the latest advancements in computer vision enable us to perform signs/gesture recognition using deep neural networks. This paper introduces an Arabic Sign Language Gesture Classification using Deer Hunting Optimization with Machine Learning (ASLGC-DHOML) model. The presented ASLGC-DHOML technique mainly concentrates on recognising and classifying sign language gestures. The presented ASLGC-DHOML model primarily pre-processes the input gesture images and generates feature vectors using the densely connected network (DenseNet169) model. For gesture recognition and classification, a multilayer perceptron (MLP) classifier is exploited to recognize and classify the existence of sign language gestures. Lastly, the DHO algorithm is utilized for parameter optimization of the MLP model. The experimental results of the ASLGC-DHOML model are tested and the outcomes are inspected under distinct aspects. The comparison analysis highlighted that the ASLGC-DHOML method has resulted in enhanced gesture classification results than other techniques with maximum accuracy of 92.88%. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
45. Hunter Prey Optimization with Hybrid Deep Learning for Fake News Detection on Arabic Corpus.
- Author
-
Alshahrani, Hala J., Hassan, Abdulkhaleq Q. A., Tarmissi, Khaled, Mehanna, Amal S., Motwakel, Abdelwahed, Yaseen, Ishfaq, Abdelmageed, Amgad Atta, and Eldesouki, Mohamed I.
- Subjects
FAKE news ,DEEP learning ,SOCIAL media ,RECURRENT neural networks ,ARTIFICIAL intelligence ,LONG short-term memory - Abstract
Nowadays, the usage of social media platforms is rapidly increasing, and rumours or false information are also rising, especially among Arab nations. This false information is harmful to society and individuals. Blocking and detecting the spread of fake news in Arabic becomes critical. Several artificial intelligence (AI) methods, including contemporary transformer techniques, BERT, were used to detect fake news. Thus, fake news in Arabic is identified by utilizing AI approaches. This article develops a new hunterprey optimization with hybrid deep learning-based fake news detection (HPOHDL-FND) model on the Arabic corpus. The HPOHDL-FND technique undergoes extensive data pre-processing steps to transform the input data into a useful format. Besides, the HPOHDL-FND technique utilizes long-term memory with a recurrent neural network (LSTM-RNN) model for fake news detection and classification. Finally, hunter prey optimization (HPO) algorithm is exploited for optimal modification of the hyperparameters related to the LSTM-RNN model. The performance validation of the HPOHDL-FND technique is tested using two Arabic datasets. The outcomes exemplified better performance over the other existing techniques with maximum accuracy of 96.57% and 93.53% on Covid19Fakes and satirical datasets, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
46. Deep Consensus Network for Recycling Waste Detection in Smart Cities.
- Author
-
Hamza, Manar Ahmed, Mengash, Hanan Abdullah, Negm, Noha, Marzouk, Radwa, Motwakel, Abdelwahed, and Zamani, Abu Sarwar
- Subjects
SMART cities ,METAHEURISTIC algorithms ,OBJECT recognition (Computer vision) ,WASTE recycling ,LANDFILLS ,WASTE management - Abstract
Recently, urbanization becomes a major concern for developing as well as developed countries. Owing to the increased urbanization, one of the important challenging issues in smart cities is waste management. So, automated waste detection and classification model becomes necessary for the smart city and to accomplish better recyclable waste management. Effective recycling of waste offers the chance of reducing the quantity of waste disposed to the land fill by minimizing the requirement of collecting raw materials. This study develops a novel Deep Consensus Network with Whale Optimization Algorithm for Recycling Waste Object Detection (DCNWORWOD) in Smart Cities. The goal of the DCNWO-RWOD technique intends to properly identify and classify the objects into recyclable and non-recyclable ones. The proposed DCNWO-RWOD technique involves the design of deep consensus network (DCN) to detect waste objects in the input image. For improving the overall object detection performance of the DCN model, the whale optimization algorithm (WOA) is exploited. Finally, Naïve Bayes (NB) classifier is used for the classification of detected waste objects into recyclable and non-recyclable ones. The performance validation of theDCNWO-RWOD technique takes place using the open access dataset. The extensive comparative study reported the enhanced performance of the DCNWO-RWOD technique interms of several measures. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
47. Intelligent Cybersecurity Classification Using Chaos Game Optimization with Deep Learning Model.
- Author
-
Alabdulkreem, Eatedal, Alotaibi, Saud S., Alamgeer, Mohammad, Marzouk, Radwa, Hilal, Anwer Mustafa, Motwakel, Abdelwahed, Zamani, Abu Sarwar, and Rizwanullah, Mohammed
- Subjects
INTERNET security ,DEEP learning ,CYBERTERRORISM ,DATA analysis ,PARAMETER estimation - Abstract
Cyberattack detection has become an important research domain owing to increasing number of cybercrimes in recent years. Both Machine Learning (ML) and Deep Learning (DL) classification models are useful in effective identification and classification of cyberattacks. In addition, the involvement of hyper parameters in DL models has a significantly influence upon the overall performance of the classification models. In this background, the current study develops Intelligent Cybersecurity Classification using Chaos Game Optimization with Deep Learning (ICC-CGODL) Model. The goal of the proposed ICC-CGODL model is to recognize and categorize different kinds of attacks made upon data. Besides, ICC-CGODL model primarily performs min-max normalization process to normalize the data into uniform format. In addition, Bidirectional Gated Recurrent Unit (BiGRU) model is utilized for detection and classification of cyberattacks. Moreover, CGO algorithm is also exploited to adjust the hyper parameters involved in BiGRU model which is the novelty of current work. A wide-range of simulation analysis was conducted on benchmark dataset and the results obtained confirmed the significant performance of ICC-CGODL technique than the recent approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
48. Optimal Deep Learning Enabled Communication System for Unmanned Aerial Vehicles.
- Author
-
Hilal, Anwer Mustafa, Alzahrani, Jaber S., Elkamchouchi, Dalia H., Eltahir, Majdy M., Almasoud, Ahmed S., Motwakel, Abdelwahed, Zamani, Abu Sarwar, and Yaseen, Ishfaq
- Subjects
DEEP learning ,DRONE aircraft ,ENERGY consumption ,ALGORITHMS ,PARAMETER estimation - Abstract
Recently, unmanned aerial vehicles (UAV) or drones are widely employed for several application areas such as surveillance, disaster management, etc. Since UAVs are limited to energy, efficient coordination between them becomes essential to optimally utilize the resources and effective communication among them and base station (BS). Therefore, clustering can be employed as an effective way of accomplishing smart communication systems among multiple UAVs. In this aspect, this paper presents a group teaching optimization algorithm with deep learning enabled smart communication system (GTOADL-SCS) technique for UAV networks. The proposed GTOADL-SCS model encompasses a two stage process namely clustering and classification. At the initial stage, the GTOADL-SCS model includes a GTOA based clustering scheme to elect cluster heads (CHs) and organize clusters. Besides, the GTOADL-SCS model develops a fitness function containing three input parameters as residual energy of UAVs, average neighoring distance, and UAV degree. For classification process, the GTOADLSCS model applies pre-trained densely connected network (DenseNet201) feature extractor with gated recurrent unit (GRU) classifier. For ensuring the enhanced performance of the GTOADL-SCS model, a widespread simulation analysis is performed and the comparative study reported the significant outcomes over the existing approaches with maximum packet delivery ratio (PDR) of 92.60%. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
49. Artificial Fish Swarm Optimization with Deep Learning Enabled Opinion Mining Approach.
- Author
-
Alotaibi, Saud S., Alabdulkreem, Eatedal, Althahabi, Sami, Hamza, Manar Ahmed, Rizwanullah, Mohammed, Zamani, Abu Sarwar, Motwakel, Abdelwahed, and Marzouk, Radwa
- Subjects
MINERAL industries ,DEEP learning ,SOCIAL media ,MACHINE learning ,NATURAL language processing - Abstract
Sentiment analysis or opinion mining (OM) concepts become familiar due to advances in networking technologies and social media. Recently, massive amount of text has been generated over Internet daily which makes the pattern recognition and decision making process difficult. Since OM find useful in business sectors to improve the quality of the product as well as services, machine learning (ML) and deep learning (DL) models can be considered into account. Besides, the hyperparameters involved in the DL models necessitate proper adjustment process to boost the classification process. Therefore, in this paper, a new Artificial Fish Swarm Optimization with Bidirectional Long Short Term Memory (AFSO-BLSTM) model has been developed for OM process. The major intention of the AFSO-BLSTM model is to effectively mine the opinions present in the textual data. In addition, the AFSO-BLSTM model undergoes pre-processing and TF-IFD based feature extraction process. Besides, BLSTM model is employed for the effectual detection and classification of opinions. Finally, the AFSO algorithm is utilized for effective hyperparameter adjustment process of the BLSTM model, shows the novelty of the work. A complete simulation study of the AFSO-BLSTM model is validated using benchmark dataset and the obtained experimental values revealed the high potential of the AFSO-BLSTM model on mining opinions. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
50. Malicious URL Classification Using Artificial Fish Swarm Optimization and Deep Learning.
- Author
-
Hilal, Anwer Mustafa, Hashim, Aisha Hassan Abdalla, Mohamed, Heba G., Nour, Mohamed K., Asiri, Mashael M., Al-Sharafi, Ali M., Othman, Mahmoud, and Motwakel, Abdelwahed
- Subjects
UNIFORM Resource Locators ,DEEP learning ,DIGITAL technology ,MACHINE learning ,CLASSIFICATION ,ALGORITHMS ,SECURITY systems - Abstract
Cybersecurity-related solutions have become familiar since it ensures security and privacy against cyberattacks in this digital era. Malicious Uniform Resource Locators (URLs) can be embedded in email or Twitter and used to lure vulnerable internet users to implement malicious data in their systems. This may result in compromised security of the systems, scams, and other such cyberattacks. These attacks hijack huge quantities of the available data, incurring heavy financial loss. At the same time, Machine Learning (ML) and Deep Learning (DL) models paved the way for designing models that can detect malicious URLs accurately and classify them. With this motivation, the current article develops an Artificial Fish Swarm Algorithm (AFSA) with Deep Learning Enabled Malicious URL Detection and Classification (AFSADL-MURLC) model. The presented AFSADL-MURLC model intends to differentiate the malicious URLs from genuine URLs. To attain this, AFSADL-MURLC model initially carries out data preprocessing and makes use of glove-based word embedding technique. In addition, the created vector model is then passed onto Gated Recurrent Unit (GRU) classification to recognize the malicious URLs. Finally, AFSA is applied to the proposed model to enhance the efficiency of GRU model. The proposed AFSADL-MURLC technique was experimentally validated using benchmark dataset sourced from Kaggle repository. The simulation results confirmed the supremacy of the proposed AFSADL-MURLC model over recent approaches under distinct measures. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.