DeepFakes and face image manipulation methods have been widely distributed in the last few years and several techniques have been presented to check the authenticity of the face image and detect manipulation if exists...
详细信息
作者:
Gabr, MohamedKorayem, YousefChen, Yen-LinYee, Por LipKu, Chin SoonAlexan, Wassim
Faculty of Media Engineering and Technology Computer Science Department Cairo11835 Egypt National Taipei University of Technology
Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Malaya
Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Universiti Tunku Abdul Rahman
Department of Computer Science Kampar31900 Malaysia
Faculty of Information Engineering and Technology Communications Department Cairo11835 Egypt
New Administrative Capital Mathematics Department Cairo13507 Egypt
This work proposes a novel image encryption algorithm that integrates unique image transformation techniques with the principles of chaotic and hyper-chaotic systems. By harnessing the unpredictable behavior of the Ch...
详细信息
This paper presents the resistance mitigation techniques for comparator design. Resistance plays an important role to semiconductor field. If resistance value higher than the design specification value, this might cau...
详细信息
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)netw...
详细信息
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)networks may be vulnerable to several routing ***’s why a network intrusion detection system(NIDS)is needed to guard against routing assaults on RPL-based IoT *** imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network ***,we propose in this paper a novel approach to balance the dataset classes based on metaheuristic optimization applied to locality-sensitive hashing and synthetic minority oversampling technique(LSH-SMOTE).The proposed optimization approach is based on a new hybrid between the grey wolf and dipper throated optimization *** prove the effectiveness of the proposed approach,a set of experiments were conducted to evaluate the performance of NIDS for three cases,namely,detection without dataset balancing,detection with SMOTE balancing,and detection with the proposed optimized LSHSOMTE *** results showed that the proposed approach outperforms the other approaches and could boost the detection *** addition,a statistical analysis is performed to study the significance and stability of the proposed *** conducted experiments include seven different types of attack cases in the RPL-NIDS17 *** on the 2696 CMC,2023,vol.74,no.2 proposed approach,the achieved accuracy is(98.1%),sensitivity is(97.8%),and specificity is(98.8%).
Several instances of pneumonia with no clear etiology were recorded in Wuhan,China,on December 31,*** world health organization(WHO)called it COVID-19 that stands for“Coronavirus Disease 2019,”which is the second ve...
详细信息
Several instances of pneumonia with no clear etiology were recorded in Wuhan,China,on December 31,*** world health organization(WHO)called it COVID-19 that stands for“Coronavirus Disease 2019,”which is the second version of the previously known severe acute respiratory syndrome(SARS)Coronavirus and identified in short as(SARSCoV-2).There have been regular restrictions to avoid the infection spread in all countries,including Saudi *** prediction of new cases of infections is crucial for authorities to get ready for early handling of the virus ***:Analysis and forecasting of epidemic patterns in new SARSCoV-2 positive patients are presented in this research using metaheuristic optimization and long short-term memory(LSTM).The optimization method employed for optimizing the parameters of LSTM is Al-Biruni Earth Radius(BER)***:To evaluate the effectiveness of the proposed methodology,a dataset is collected based on the recorded cases in Saudi Arabia between March 7^(th),2020 and July 13^(th),*** addition,six regression models were included in the conducted experiments to show the effectiveness and superiority of the proposed *** achieved results show that the proposed approach could reduce the mean square error(MSE),mean absolute error(MAE),and R^(2)by 5.92%,3.66%,and 39.44%,respectively,when compared with the six base *** the other hand,a statistical analysis is performed to measure the significance of the proposed ***:The achieved results confirm the effectiveness,superiority,and significance of the proposed approach in predicting the infection cases of COVID-19.
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of featu...
详细信息
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of features using typical *** a result,a new metaheuristicsbased feature selection method based on the dipper-throated and grey-wolf optimization(DTO-GW)algorithms has been developed in this *** can result when the selection of features is subject to metaheuristics,which can lead to a wide range of ***,we adopted hybrid optimization in our method of optimizing,which allowed us to better balance exploration and harvesting chores more *** propose utilizing the binary DTO-GW search approach we previously devised for selecting the optimal subset of *** the proposed method,the number of features selected is minimized,while classification accuracy is *** test the proposed method’s performance against eleven other state-of-theart approaches,eight datasets from the UCI repository were used,such as binary grey wolf search(bGWO),binary hybrid grey wolf,and particle swarm optimization(bGWO-PSO),bPSO,binary stochastic fractal search(bSFS),binary whale optimization algorithm(bWOA),binary modified grey wolf optimization(bMGWO),binary multiverse optimization(bMVO),binary bowerbird optimization(bSBO),binary hysteresis optimization(bHy),and binary hysteresis optimization(bHWO).The suggested method is superior 4532 CMC,2023,vol.74,no.2 and successful in handling the problem of feature selection,according to the results of the experiments.
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp...
详细信息
Rainfall plays a significant role in managing the water level in the *** unpredictable amount of rainfall due to the climate change can cause either overflow or dry in the *** individuals,especially those in the agric...
详细信息
Rainfall plays a significant role in managing the water level in the *** unpredictable amount of rainfall due to the climate change can cause either overflow or dry in the *** individuals,especially those in the agricultural sector,rely on rain *** rainfall is challenging because of the changing nature of the *** area of Jimma in southwest Oromia,Ethiopia is the subject of this research,which aims to develop a rainfall forecasting *** estimate Jimma's daily rainfall,we propose a novel approach based on optimizing the parameters of long short-term memory(LSTM)using Al-Biruni earth radius(BER)optimization algorithm for boosting the fore-casting accuracy.N ash-Sutcliffe model eficiency(NSE),mean square error(MSE),root MSE(RMSE),mean absolute error(MAE),and R2 were all used in the conducted experiments to assess the proposed approach,with final scores of(0.61),(430.81),(19.12),and(11.09),***,we compared the proposed model to current machine-learning regression models;such as non-optimized LSTM,bidirectional LSTM(BiLSTM),gated recurrent unit(GRU),and convolutional LSTM(ConvLSTM).It was found that the proposed approach achieved the lowest RMSE of(19.12).In addition,the experimental results show that the proposed model has R-with a value outperforming the other models,which confirms the superiority of the proposed *** the other hand,a statistical analysis is performed to measure the significance and stability of the proposed approach and the recorded results proved the expected perfomance.
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc...
详细信息
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protocol becomes a major concern in the ***,MANET’s lack of infrastructure,unpredictable topology,and restricted resources,as well as the lack of a previously permitted trust relationship among connected nodes,contribute to the attack detection burden.A novel detection approach is presented in this paper to classify passive and active black-hole *** proposed approach is based on the dipper throated optimization(DTO)algorithm,which presents a plausible path out of multiple paths for statistics transmission to boost MANETs’quality of service.A group of selected packet features will then be weighed by the DTO-based multi-layer perceptron(DTO-MLP),and these features are collected from nodes using the Low Energy Adaptive Clustering Hierarchical(LEACH)clustering *** is a powerful classifier and the DTO weight optimization method has a significant impact on improving the classification process by strengthening the weights of key features while suppressing the weights ofminor *** hybridmethod is primarily designed to combat active black-hole *** the LEACH clustering phase,however,can also detect passive black-hole *** effect of mobility variation on detection error and routing overhead is explored and evaluated using the suggested *** diverse mobility situations,the results demonstrate up to 97%detection accuracy and faster execution ***,the suggested approach uses an adjustable threshold value to make a correct conclusion regarding whether a node is malicious or benign.
We propose a Quadratic Unconstrained Binary Optimization (QUBO) matrix distorting method to solve combinatorial optimization problems, which are very often seen in consumer applications, with high speed and high accur...
详细信息
暂无评论