48 results on '"Alrowais, Fadwa"'
Search Results
2. Deep feature fusion with computer vision driven fall detection approach for enhanced assisted living safety
- Author
-
Almukadi, Wafa Sulaiman, Alrowais, Fadwa, Saeed, Muhammad Kashif, Yahya, Abdulsamad Ebrahim, Mahmud, Ahmed, and Marzouk, Radwa
- Published
- 2024
- Full Text
- View/download PDF
3. Automated approach to predict cerebral stroke based on fuzzy inference and convolutional neural network
- Author
-
Alrowais, Fadwa, Jamjoom, Arwa A., Karamti, Hanen, Umer, Muhammad, Alsubai, Shtwai, Abate, Andrea F., and Ashraf, Imran
- Published
- 2024
- Full Text
- View/download PDF
4. An improved skin lesion detection solution using multi-step preprocessing features and NASNet transfer learning model
- Author
-
Altamimi, Abdulaziz, Alrowais, Fadwa, Karamti, Hanen, Umer, Muhammad, Cascone, Lucia, and Ashraf, Imran
- Published
- 2024
- Full Text
- View/download PDF
5. An enhanced drought forecasting in coastal arid regions using deep learning approach with evaporation index
- Author
-
Al Moteri, Moteeb, Alrowais, Fadwa, Mtouaa, Wafa, Aljehane, Nojood O., Alotaibi, Saud S., Marzouk, Radwa, Mustafa Hilal, Anwer, and Ahmed, Noura Abdelaziz
- Published
- 2024
- Full Text
- View/download PDF
6. Accompanying deep framework for faults in motor and gearbox with disproportion vibrational samples
- Author
-
Karamti, Hanen, Lashin, Maha M. A., Alrowais, Fadwa, and Mahmoud, Abeer M.
- Published
- 2023
- Full Text
- View/download PDF
7. Cyber attack detection in healthcare data using cyber-physical system with optimized algorithm
- Author
-
Alrowais, Fadwa, Mohamed, Heba G., Al-Wesabi, Fahd N., Al Duhayyim, Mesfer, Hilal, Anwer Mustafa, and Motwakel, Abdelwahed
- Published
- 2023
- Full Text
- View/download PDF
8. Hybrid leader based optimization with deep learning driven weed detection on internet of things enabled smart agriculture environment
- Author
-
Alrowais, Fadwa, Asiri, Mashael M, Alabdan, Rana, Marzouk, Radwa, Hilal, Anwer Mustafa, alkhayyat, Ahmed, and Gupta, Deepak
- Published
- 2022
- Full Text
- View/download PDF
9. Oppositional poor and rich optimization with deep learning enabled secure internet of drone communication system
- Author
-
Al-Wesabi, Fahd N., Alrowais, Fadwa, Alzahrani, Jaber S., Marzouk, Radwa, Al Duhayyim, Mesfer, alkhayyat, Ahmed, and Gupta, Deepak
- Published
- 2022
- Full Text
- View/download PDF
10. A Hybrid Deep Contractive Autoencoder and Restricted Boltzmann Machine Approach to Differentiate Representation of Female Brain Disorder
- Author
-
M.Mahmoud, Abeer, Alrowais, Fadwa, and Karamti, Hanen
- Published
- 2020
- Full Text
- View/download PDF
11. Enhanced Pelican Optimization Algorithm with Deep Learning-Driven Mitotic Nuclei Classification on Breast Histopathology Images.
- Author
-
Alrowais, Fadwa, Alotaibi, Faiz Abdullah, Hassan, Abdulkhaleq Q. A., Marzouk, Radwa, Alnfiai, Mrim M., and Sayed, Ahmed
- Subjects
- *
DEEP learning , *OPTIMIZATION algorithms , *IMAGE recognition (Computer vision) , *BREAST imaging , *COMPUTER algorithms , *AUTOMATIC classification - Abstract
Breast cancer (BC) is a prevalent disease worldwide, and accurate diagnoses are vital for successful treatment. Histopathological (HI) inspection, particularly the detection of mitotic nuclei, has played a pivotal function in the prognosis and diagnosis of BC. It includes the detection and classification of mitotic nuclei within breast tissue samples. Conventionally, the detection of mitotic nuclei has been a subjective task and is time-consuming for pathologists to perform manually. Automatic classification using computer algorithms, especially deep learning (DL) algorithms, has been developed as a beneficial alternative. DL and CNNs particularly have shown outstanding performance in different image classification tasks, including mitotic nuclei classification. CNNs can learn intricate hierarchical features from HI images, making them suitable for detecting subtle patterns related to the mitotic nuclei. In this article, we present an Enhanced Pelican Optimization Algorithm with a Deep Learning-Driven Mitotic Nuclei Classification (EPOADL-MNC) technique on Breast HI. This developed EPOADL-MNC system examines the histopathology images for the classification of mitotic and non-mitotic cells. In this presented EPOADL-MNC technique, the ShuffleNet model can be employed for the feature extraction method. In the hyperparameter tuning procedure, the EPOADL-MNC algorithm makes use of the EPOA system to alter the hyperparameters of the ShuffleNet model. Finally, we used an adaptive neuro-fuzzy inference system (ANFIS) for the classification and detection of mitotic cell nuclei on histopathology images. A series of simulations took place to validate the improved detection performance of the EPOADL-MNC technique. The comprehensive outcomes highlighted the better outcomes of the EPOADL-MNC algorithm compared to existing DL techniques with a maximum accuracy of 97.83%. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
12. Red Deer Optimization with Artificial Intelligence Enabled Image Captioning System for Visually Impaired People.
- Author
-
Hilal, Anwer Mustafa, Alrowais, Fadwa, Al-Wesabi, Fahd N., and Marzouk, Radwa
- Subjects
COMPUTER vision ,NATURAL language processing ,ARTIFICIAL intelligence ,PEOPLE with visual disabilities ,ARTIFICIAL neural networks - Abstract
The problem of producing a natural language description of an image for describing the visual content has gained more attention in natural language processing (NLP) and computer vision (CV). It can be driven by applications like image retrieval or indexing, virtual assistants, image understanding, and support of visually impaired people (VIP). Though the VIP uses other senses, touch and hearing, for recognizing objects and events, the quality of life of those persons is lower than the standard level. Automatic Image captioning generates captions that will be read loudly to the VIP, thereby realizing matters happening around them. This article introduces a Red Deer Optimization with Artificial Intelligence Enabled Image Captioning System (RDOAI-ICS) for Visually Impaired People. The presented RDOAI-ICS technique aids in generating image captions for VIPs. The presented RDOAIICS technique utilizes a neural architectural search network (NASNet) model to produce image representations. Besides, the RDOAI-ICS technique uses the radial basis function neural network (RBFNN) method to generate a textual description. To enhance the performance of the RDOAI-ICS method, the parameter optimization process takes place using the RDO algorithm for NasNet and the butterfly optimization algorithm (BOA) for the RBFNN model, showing the novelty of the work. The experimental evaluation of the RDOAI-ICS method can be tested using a benchmark dataset. The outcomes show the enhancements of the RDOAI-ICS method over other recent Image captioning approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
13. Artificial Algae Optimization with Deep Belief Network Enabled Ransomware Detection in IoT Environment.
- Author
-
Al Duhayyim, Mesfer, Mohamed, Heba G., Alrowais, Fadwa, Al-Wesabi, Fahd N., Hilal, Anwer Mustafa, and Motwakel, Abdelwahed
- Subjects
INTERNET of things ,DEEP learning ,MACHINE learning ,ARTIFICIAL neural networks ,INTERNET security - Abstract
The Internet of Things (IoT) has gained more popularity in research because of its large-scale challenges and implementation. But security was the main concern when witnessing the fast development in its applications and size. It was a dreary task to independently set security systems in every IoT gadget and upgrade them according to the newer threats. Additionally, machine learning (ML) techniques optimally use a colossal volume of data generated by IoT devices. Deep Learning (DL) related systems were modelled for attack detection in IoT. But the current security systems address restricted attacks and can be utilized outdated datasets for evaluations. This study develops an Artificial Algae Optimization Algorithm with Optimal Deep Belief Network (AAA-ODBN) Enabled Ransomware Detection in an IoT environment. The presented AAAODBN technique mainly intends to recognize and categorize ransomware in the IoT environment. The presented AAA-ODBN technique follows a three-stage process: feature selection, classification, and parameter tuning. In the first stage, the AAA-ODBN technique uses AAA based feature selection (AAA-FS) technique to elect feature subsets. Secondly, the AAA-ODBN technique employs the DBN model for ransomware detection. At last, the dragonfly algorithm (DFA) is utilized for the hyperparameter tuning of the DBN technique. A sequence of simulations is implemented to demonstrate the improved performance of the AAA-ODBN algorithm. The experimental values indicate the significant outcome of the AAA-ODBN model over other models. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
14. Al-Biruni Based Optimization of Rainfall Forecasting in Ethiopia.
- Author
-
El-kenawy, El-Sayed M., Abdelhamid, Abdelaziz A., Alrowais, Fadwa, Abotaleb, Mostafa, Ibrahim, Abdelhameed, and Khafaga, Doaa Sami
- Subjects
RAINFALL ,CLIMATE change ,SHORT-term memory ,MACHINE learning ,METAHEURISTIC algorithms - Abstract
Rainfall plays a significant role in managing the water level in the reservoir. The unpredictable amount of rainfall due to the climate change can cause either overflow or dry in the reservoir. Many individuals, especially those in the agricultural sector, rely on rain forecasts. Forecasting rainfall is challenging because of the changing nature of the weather. The area of Jimma in southwest Oromia, Ethiopia is the subject of this research, which aims to develop a rainfall forecasting model. To estimate Jimma's daily rainfall, we propose a novel approach based on optimizing the parameters of long short-term memory (LSTM) using Al-Biruni earth radius (BER) optimization algorithm for boosting the forecasting accuracy. Nash-Sutcliffe model efficiency (NSE), mean square error (MSE), root MSE (RMSE), mean absolute error (MAE), and R2 were all used in the conducted experiments to assess the proposed approach, with final scores of (0.61), (430.81), (19.12), and (11.09), respectively. Moreover, we compared the proposed model to current machine-learning regression models; such as non-optimized LSTM, bidirectional LSTM (BiLSTM), gated recurrent unit (GRU), and convolutional LSTM (ConvLSTM). It was found that the proposed approach achieved the lowest RMSE of (19.12). In addition, the experimental results show that the proposed model has R2 with a value outperforming the other models, which confirms the superiority of the proposed approach. On the other hand, a statistical analysis is performed to measure the significance and stability of the proposed approach and the recorded results proved the expected performance. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
15. Modeling of Combined Economic and Emission Dispatch Using Improved Sand Cat Optimization Algorithm.
- Author
-
Alrowais, Fadwa, Alzahrani, Jaber S., Marzouk, Radwa, Mohamed, Abdullah, and Mohammed, Gouse Pasha
- Subjects
OPTIMIZATION algorithms ,SAND ,ECONOMIC models ,FUEL costs ,METAHEURISTIC algorithms ,NONLINEAR systems ,PARTICLE swarm optimization - Abstract
Combined Economic and Emission Dispatch (CEED) task forms multi-objective optimization problems to be resolved to minimize emission and fuel costs. The disadvantage of the conventional method is its incapability to avoid falling in local optimal, particularly when handling nonlinear and complex systems. Metaheuristics have recently received considerable attention due to their enhanced capacity to prevent local optimal solutions in addressing all the optimization problems as a black box. Therefore, this paper focuses on the design of an improved sand cat optimization algorithm based CEED (ISCOA-CEED) technique. The ISCOA-CEED technique majorly concentrates on reducing fuel costs and the emission of generation units. Moreover, the presented ISCOA-CEED technique transforms the equality constraints of the CEED issue into inequality constraints. Besides, the improved sand cat optimization algorithm (ISCOA) is derived from the integration of traditional SCOA with the Levy Flight (LF) concept. At last, the ISCOA-CEED technique is applied to solve a series of 6 and 11 generators in the CEED issue. The experimental validation of the ISCOA-CEED technique ensured the enhanced performance of the presented ISCOA-CEED technique over other recent approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
16. Hand Gesture Recognition for Disabled People Using Bayesian Optimization with Transfer Learning.
- Author
-
Alrowais, Fadwa, Marzouk, Radwa, Al-Wesabi, Fahd N., and Hilal, Anwer Mustafa
- Subjects
PEOPLE with disabilities ,AMERICAN Sign Language ,GESTURE ,DEEP learning ,FEATURE extraction ,SIGN language ,COMPUTER vision - Abstract
Sign language recognition can be treated as one of the efficient solutions for disabled people to communicate with others. It helps them to convey the required data by the use of sign language with no issues. The latest developments in computer vision and image processing techniques can be accurately utilized for the sign recognition process by disabled people. American Sign Language (ASL) detection was challenging because of the enhancing intraclass similarity and higher complexity. This article develops a new Bayesian Optimization with Deep Learning-Driven Hand Gesture Recognition Based Sign Language Communication (BODL-HGRSLC) for Disabled People. The BODL-HGRSLC technique aims to recognize the hand gestures for disabled people's communication. The presented BODL-HGRSLC technique integrates the concepts of computer vision (CV) and DL models. In the presented BODL-HGRSLC technique, a deep convolutional neural network-based residual network (ResNet) model is applied for feature extraction. Besides, the presented BODL-HGRSLC model uses Bayesian optimization for the hyperparameter tuning process. At last, a bidirectional gated recurrent unit (BiGRU) model is exploited for the HGR procedure. A wide range of experiments was conducted to demonstrate the enhanced performance of the presented BODL-HGRSLC model. The comprehensive comparison study reported the improvements of the BODL-HGRSLC model over other DL models with maximum accuracy of 99.75%. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
17. Enhanced Crow Search with Deep Learning-Based Cyberattack Detection in SDN-IoT Environment.
- Author
-
Motwakel, Abdelwahed, Alrowais, Fadwa, Tarmissi, Khaled, Marzouk, Radwa, Mohamed, Abdullah, Zamani, Abu Sarwar, Yaseen, Ishfaq, and Eldesouki, Mohamed I.
- Subjects
DEEP learning ,CYBERTERRORISM ,SOFTWARE-defined networking ,DATA security failures ,ALGORITHMS ,SEARCH algorithms - Abstract
The paradigm shift towards the Internet of Things (IoT) phenomenon and the rise of edge-computing models provide massive potential for several upcoming IoT applications like smart grid, smart energy, smart home, smart health and smart transportation services. However, it also provides a sequence of novel cyber-security issues. Although IoT networks provide several advantages, the heterogeneous nature of the network and the wide connectivity of the devices make the network easy for cyber-attackers. Cyberattacks result in financial loss and data breaches for organizations and individuals. So, it becomes crucial to secure the IoT environment from such cyberattacks. With this motivation, the current study introduces an effectual Enhanced Crow Search Algorithm with Deep Learning-Driven Cyberattack Detection (ECSADL-CAD) model for the Software-Defined Networking (SDN)-enabled IoT environment. The presented ECSADL-CAD approach aims to identify and classify the cyberattacks in the SDN-enabled IoT environment. To attain this, the ECSADL-CAD model initially pre-processes the data. In the presented ECSADL-CAD model, the Reinforced Deep Belief Network (RDBN) model is employed for attack detection. At last, the ECSA-based hyperparameter tuning process gets executed to boost the overall classification outcomes. A series of simulations were conducted to validate the improved outcomes of the proposed ECSADL-CAD model. The experimental outcomes confirmed the superiority of the proposed ECSADLCAD model over other existing methodologies. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
18. Optimal Wavelet Neural Network-Based Intrusion Detection in Internet of Things Environment.
- Author
-
Mohamed, Heba G., Alrowais, Fadwa, Al-Hagery, Mohammed Abdullah, Al Duhayyim, Mesfer, Hilal, Anwer Mustafa, and Motwakel, Abdelwahed
- Subjects
INTERNET of things ,INTRUSION detection systems (Computer security) ,OPTIMIZATION algorithms ,SUBSET selection ,FEATURE selection ,MACHINE learning - Abstract
As the Internet of Things (IoT) endures to develop, a huge count of data has been created. An IoT platform is rather sensitive to security challenges as individual data can be leaked, or sensor data could be used to cause accidents. As typical intrusion detection system (IDS) studies can be frequently designed for working well on databases, it can be unknown if they intend to work well in altering network environments. Machine learning (ML) techniques are depicted to have a higher capacity at assisting mitigate an attack on IoT device and another edge system with reasonable accuracy. This article introduces a new Bird Swarm Algorithm with Wavelet Neural Network for Intrusion Detection (BSAWNN-ID) in the IoT platform. The main intention of the BSAWNN-ID algorithm lies in detecting and classifying intrusions in the IoT platform. The BSAWNN-ID technique primarily designs a feature subset selection using the coyote optimization algorithm (FSS-COA) to attain this. Next, to detect intrusions, the WNN model is utilized. At last, the WNN parameters are optimally modified by the use of BSA. A widespread experiment is performed to depict the better performance of the BSAWNN-ID technique. The resultant values indicated the better performance of the BSAWNN-ID technique over other models, with an accuracy of 99.64% on the UNSW-NB15 dataset. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
19. Deep Transfer Learning-Enabled Activity Identification and Fall Detection for Disabled People.
- Author
-
Eltahir, Majdy M., Yousif, Adil, Alrowais, Fadwa, Nour, Mohamed K., Marzouk, Radwa, Dafaalla, Hatim, Hassan Elnour, Asma Abbas, Aziz, Amira Sayed A., and Hamza, Manar Ahmed
- Subjects
PEOPLE with disabilities ,LONG short-term memory ,OLDER people ,FALSE alarms ,PHYSICAL activity ,HUMAN activity recognition - Abstract
The human motion data collected using wearables like smartwatches can be used for activity recognition and emergency event detection. This is especially applicable in the case of elderly or disabled people who live self-reliantly in their homes. These sensors produce a huge volume of physical activity data that necessitates real-time recognition, especially during emergencies. Falling is one of the most important problems confronted by older people and people with movement disabilities. Numerous previous techniques were introduced and a few used webcam to monitor the activity of elderly or disabled people. But, the costs incurred upon installation and operation are high, whereas the technology is relevant only for indoor environments. Currently, commercial wearables use a wireless emergency transmitter that produces a number of false alarms and restricts a user’s movements. Against this background, the current study develops an Improved Whale Optimization with Deep Learning-Enabled Fall Detection for Disabled People (IWODL-FDDP) model. The presented IWODL-FDDP model aims to identify the fall events to assist disabled people. The presented IWODLFDDP model applies an image filtering approach to pre-process the image. Besides, the EfficientNet-B0 model is utilized to generate valuable feature vector sets. Next, the Bidirectional Long Short Term Memory (BiLSTM) model is used for the recognition and classification of fall events. Finally, the IWO method is leveraged to fine-tune the hyperparameters related to the BiLSTM method, which shows the novelty of the work. The experimental analysis outcomes established the superior performance of the proposed IWODL-FDDP method with a maximum accuracy of 97.02%. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
20. Automated Machine Learning Enabled Cybersecurity Threat Detection in Internet of Things Environment.
- Author
-
Alrowais, Fadwa, Althahabi, Sami, Alotaibi, Saud S., Mohamed, Abdullah, Hamza, Manar Ahmed, and Marzouk, Radwa
- Subjects
INTERNET of things ,INTERNET security ,MACHINE learning ,COMPUTER algorithms ,DATA analysis - Abstract
Recently, Internet of Things (IoT) devices produces massive quantity of data from distinct sources that get transmitted over public networks. Cybersecurity becomes a challenging issue in the IoT environment where the existence of cyber threats needs to be resolved. The development of automated tools for cyber threat detection and classification using machine learning (ML) and artificial intelligence (AI) tools become essential to accomplish security in the IoT environment. It is needed to minimize security issues related to IoT gadgets effectively. Therefore, this article introduces a new Mayfly optimization (MFO) with regularized extreme learning machine (RELM) model, named MFO-RELM for Cybersecurity Threat Detection and classification in IoT environment. The presented MFORELM technique accomplishes the effectual identification of cybersecurity threats that exist in the IoT environment. For accomplishing this, the MFO-RELM model pre-processes the actual IoT data into a meaningful format. In addition, the RELM model receives the pre-processed data and carries out the classification process. In order to boost the performance of the RELM model, the MFO algorithm has been employed to it. The performance validation of the MFO-RELM model is tested using standard datasets and the results highlighted the better outcomes of the MFO-RELM model under distinct aspects. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. Novel Optimized Feature Selection Using Metaheuristics Applied to Physical Benchmark Datasets.
- Author
-
Khafaga, Doaa Sami, El-kenawy, El-Sayed M., Alrowais, Fadwa, Kumar, Sunil, Ibrahim, Abdelhameed, and Abdelhamid, Abdelaziz A.
- Subjects
FEATURE selection ,METAHEURISTIC algorithms ,PARTICLE swarm optimization ,SEARCH algorithms ,GENETIC algorithms ,MACHINE learning - Abstract
In data mining and machine learning, feature selection is a critical part of the process of selecting the optimal subset of features based on the target data. There are 2n potential feature subsets for every n features in a dataset, making it difficult to pick the best set of features using standard approaches. Consequently, in this research, a new metaheuristics-based feature selection technique based on an adaptive squirrel search optimization algorithm (ASSOA) has been proposed. When using metaheuristics to pick features, it is common for the selection of features to vary across runs, which can lead to instability. Because of this, we used the adaptive squirrel search to balance exploration and exploitation duties more evenly in the optimization process. For the selection of the best subset of features, we recommend using the binary ASSOA search strategy we developed before. According to the suggested approach, the number of features picked is reduced while maximizing classification accuracy. A ten-feature dataset from the University of California, Irvine (UCI) repository was used to test the proposed method's performance vs. eleven other state-of-the-art approaches, including binary grey wolf optimization (bGWO), binary hybrid grey wolf and particle swarm optimization (bGWO-PSO), bPSO, binary stochastic fractal search (bSFS), binary whale optimization algorithm (bWOA), binary modified grey wolf optimization (bMGWO), binary multiverse optimization (bMVO), binary bowerbird optimization (bSBO), binary hybrid GWO and genetic algorithm (bGWO-GA), binary firefly algorithm (bFA), and bGAmethods. Experimental results confirm the superiority and effectiveness of the proposed algorithm for solving the problem of feature selection. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
22. Clinical Decision Support Systems to Predict Drug–Drug Interaction Using Multilabel Long Short-Term Memory with an Autoencoder.
- Author
-
Alrowais, Fadwa, Alotaibi, Saud S., Hilal, Anwer Mustafa, Marzouk, Radwa, Mohsen, Heba, Osman, Azza Elneil, Alneil, Amani A., and Eldesouki, Mohamed I.
- Published
- 2023
- Full Text
- View/download PDF
23. Breast Cancer Detection Using Convoluted Features and Ensemble Machine Learning Algorithm.
- Author
-
Umer, Muhammad, Naveed, Mahum, Alrowais, Fadwa, Ishaq, Abid, Hejaili, Abdullah Al, Alsubai, Shtwai, Eshmawi, Ala' Abdulmajid, Mohamed, Abdullah, and Ashraf, Imran
- Subjects
BREAST tumor diagnosis ,RESEARCH methodology ,MACHINE learning ,EARLY detection of cancer ,CANCER patients ,BREAST ,DESCRIPTIVE statistics ,ARTIFICIAL neural networks ,SENSITIVITY & specificity (Statistics) ,LOGISTIC regression analysis ,ALGORITHMS ,BREAST tumors - Abstract
Simple Summary: This paper presents a breast cancer detection approach where the convoluted features from a convolutional neural network are utilized to train a machine learning model. Results demonstrate that use of convoluted features yields better results than the original features to classify malignant and benign tumors. Breast cancer is a common cause of female mortality in developing countries. Screening and early diagnosis can play an important role in the prevention and treatment of these cancers. This study proposes an ensemble learning-based voting classifier that combines the logistic regression and stochastic gradient descent classifier with deep convoluted features for the accurate detection of cancerous patients. Deep convoluted features are extracted from the microscopic features and fed to the ensemble voting classifier. This idea provides an optimized framework that accurately classifies malignant and benign tumors with improved accuracy. Results obtained using the voting classifier with convoluted features demonstrate that the highest classification accuracy of 100% is achieved. The proposed approach revealed the accuracy enhancement in comparison with the state-of-the-art approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
24. Quasi‐oppositional wild horse optimization based multi‐agent path finding scheme for real time IoT systems.
- Author
-
Marzouk, Radwa, Alzahrani, Jaber S., Alrowais, Fadwa, Al‐Wesabi, Fahd N., and Hamza, Manar Ahmed
- Subjects
WILD horses ,INTERNET of things ,MULTIAGENT systems ,ENERGY consumption - Abstract
Multi‐Agent System (MAS) gained significant interest amongst researchers since it provides multiple benefits through several application areas. MAS involves a network of socially‐cooperative smart agents that is conscious about the drastic modifications that occur in the platform at the time of task execution. On the other hand, energy efficiency is a major issue in real‐time IoT systems, since most of the sensor nodes experience energy constraints. Though several works have been conducted earlier, there is a need exists to design an effective solution for simultaneous processing in real‐time environments using multiple agents. The aim of Multi‐Agent Pathfinding (MAPF) process is to provide collision‐free routes so as to divert the agents from original path to the destination. In this view, the current study designs a Quasi‐Oppositional Wild Horse Optimization‐based Multi‐Agent Path Finding (QOWHO‐MAPF) scheme for real‐time IoT systems. The aim of the proposed QOWHO‐MAPF scheme is to determine the optimal set of paths to reach the destination in real‐time IoT networks. QOWHO algorithm is created by integrating the concepts of Quasi‐Oppositional Based Learning (QOBL) and conventional WHO algorithm. In addition, the proposed QOWHO‐MAPF model derives a fitness function that involves two input parameters such as residual energy and distance‐to‐destination. The proposed QOWHO‐MAPF model was experimentally analysed and the results were inspected under several aspects. The simulation results established that QOWHO‐MAPF model is a superior model compared to other state‐of‐the‐art models. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
25. Deep Learning with Dipper Throated Optimization Algorithm for Energy Consumption Forecasting in Smart Households.
- Author
-
Abdelhamid, Abdelaziz A., El-Kenawy, El-Sayed M., Alrowais, Fadwa, Ibrahim, Abdelhameed, Khodadadi, Nima, Lim, Wei Hong, Alruwais, Nuha, and Khafaga, Doaa Sami
- Subjects
ENERGY consumption forecasting ,DEEP learning ,MATHEMATICAL optimization ,STANDARD deviations ,ENERGY consumption ,HOUSEHOLDS - Abstract
One of the relevant factors in smart energy management is the ability to predict the consumption of energy in smart households and use the resulting data for planning and operating energy generation. For the utility to save money on energy generation, it must be able to forecast electrical demands and schedule generation resources to meet the demand. In this paper, we propose an optimized deep network model for predicting future consumption of energy in smart households based on the Dipper Throated Optimization (DTO) algorithm and Long Short-Term Memory (LSTM). The proposed deep network consists of three parts, the first part contains a single layer of bidirectional LSTM, the second part contains a set of stacked unidirectional LSTM, and the third part contains a single layer of fully connected neurons. The design of the proposed deep network targets represents the temporal dependencies of energy consumption for boosting prediction accuracy. The parameters of the proposed deep network are optimized using the DTO algorithm. The proposed model is validated using the publicly available UCI household energy dataset. In comparison to the other competing machine learning models, such as Random Forest (RF), Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Multi-Layer Perceptron (MLP), Sequence-to-Sequence (Seq2Seq), and standard LSTM, the performance of the proposed model shows promising effectiveness and superiority when evaluated using eight evaluation criteria including Root Mean Square Error (RMSE) and R 2 . Experimental results show that the proposed optimized deep model achieved an RMSE of (0.0047) and R 2 of (0.998), which outperform those values achieved by the other models. In addition, a sensitivity analysis is performed to study the stability and significance of the proposed approach. The recorded results confirm the effectiveness, superiority, and stability of the proposed approach in predicting the future consumption of energy in smart households. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
26. Manta Ray Foraging Optimization Transfer Learning-Based Gastric Cancer Diagnosis and Classification on Endoscopic Images.
- Author
-
Alrowais, Fadwa, S. Alotaibi, Saud, Marzouk, Radwa, S. Salama, Ahmed, Rizwanullah, Mohammed, Zamani, Abu Sarwar, Atta Abdelmageed, Amgad, and I. Eldesouki, Mohamed
- Subjects
- *
NOISE control , *STOMACH tumors , *DEEP learning , *QUALITY assurance , *DESCRIPTIVE statistics , *ENDOSCOPIC gastrointestinal surgery , *COMPUTER-aided diagnosis , *SENSITIVITY & specificity (Statistics) , *ARTIFICIAL neural networks , *STATISTICAL models , *ALGORITHMS - Abstract
Simple Summary: This paper aims to develops a new Manta Ray Foraging Optimization Transfer Learning technique that is based on Gastric Cancer Diagnosis and Classification (MRFOTL-GCDC) using endoscopic images. Gastric cancer (GC) diagnoses using endoscopic images have gained significant attention in the healthcare sector. The recent advancements of computer vision (CV) and deep learning (DL) technologies pave the way for the design of automated GC diagnosis models. Therefore, this study develops a new Manta Ray Foraging Optimization Transfer Learning technique that is based on Gastric Cancer Diagnosis and Classification (MRFOTL-GCDC) using endoscopic images. For enhancing the quality of the endoscopic images, the presented MRFOTL-GCDC technique executes the Wiener filter (WF) to perform a noise removal process. In the presented MRFOTL-GCDC technique, MRFO with SqueezeNet model is used to derive the feature vectors. Since the trial-and-error hyperparameter tuning is a tedious process, the MRFO algorithm-based hyperparameter tuning results in enhanced classification results. Finally, the Elman Neural Network (ENN) model is utilized for the GC classification. To depict the enhanced performance of the presented MRFOTL-GCDC technique, a widespread simulation analysis is executed. The comparison study reported the improvement of the MRFOTL-GCDC technique for endoscopic image classification purposes with an improved accuracy of 99.25%. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
27. Intelligent Intrusion Detection Using Arithmetic Optimization Enabled Density Based Clustering with Deep Learning.
- Author
-
Alrowais, Fadwa, Marzouk, Radwa, Nour, Mohamed K., Mohsen, Heba, Hilal, Anwer Mustafa, Yaseen, Ishfaq, Alsaid, Mohamed Ibrahim, and Mohammed, Gouse Pasha
- Subjects
INTRUSION detection systems (Computer security) ,DEEP learning ,LONG-term memory ,ARITHMETIC ,MACHINE learning ,COMPUTER network security - Abstract
Rapid advancements in the internet and communication domains have led to a massive rise in the network size and the equivalent data. Consequently, several new attacks have been created and pose several challenging issues for network security. In addition, the intrusions can launch several attacks and can be handled by the use of intrusion detection system (IDS). Though several IDS models are available in the literature, there is still a need to improve the detection rate and decrease the false alarm rate. The recent developments of machine learning (ML) and deep learning (DL)-based IDS systems are being deployed as possible solutions for effective intrusion detection. In this work, we propose an arithmetic optimization-enabled density-based clustering with deep learning (AOEDBC-DL) model for intelligent intrusion detection. The presented AOEDBC-DL technique follows a data clustering process to handle the massive quantity of network data traffic. To accomplish this, the AOEDBC-DL technique applied a density-based clustering technique and the initial set of clusters are initialized using the arithmetic optimization algorithm (AOA). In order to recognize and classify intrusions, a bidirectional long short term memory (BiLSTM) mechanism was exploited in this study. Eventually, the AOA was applied as a hyperparameter tuning procedure of the BiLSTM model. The experimental result analysis of the AOEDBC-DL algorithm was tested using benchmark IDS datasets. Extensive comparison studies highlighted the enhancements of the AOEDBC-DL technique over other existing approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
28. Sign Language Recognition and Classification Model to Enhance Quality of Disabled People.
- Author
-
Alrowais, Fadwa, Alotaibi, Saud S., Dhahbi, Sami, Marzouk, Radwa, Mohamed, Abdullah, and Hilal, Anwer Mustafa
- Subjects
SIGN language ,PEOPLE with disabilities ,LONG short-term memory ,IMAGE processing ,DEEP learning ,METAHEURISTIC algorithms - Abstract
Sign language recognition can be considered as an effective solution for disabled people to communicate with others. It helps them in conveying the intended information using sign languages without any challenges. Recent advancements in computer vision and image processing techniques can be leveraged to detect and classify the signs used by disabled people in an effective manner. Metaheuristic optimization algorithms can be designed in a manner such that it fine tunes the hyper parameters, used in Deep Learning (DL) models as the latter considerably impacts the classification results. With this motivation, the current study designs the Optimal Deep Transfer Learning Driven Sign Language Recognition and Classification (ODTL-SLRC) model for disabled people. The aim of the proposed ODTL-SLRC technique is to recognize and classify sign languages used by disabled people. The proposed ODTL-SLRC technique derives EfficientNet model to generate a collection of useful feature vectors. In addition, the hyper parameters involved in EfficientNet model are fine-tuned with the help of HGSO algorithm. Moreover, Bidirectional Long Short Term Memory (BiLSTM) technique is employed for sign language classification. The proposed ODTL-SLRC technique was experimentally validated using benchmark dataset and the results were inspected under several measures. The comparative analysis results established the superior performance of the proposed ODTL-SLRC technique over recent approaches in terms of efficiency. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
29. Atom Search Optimization with Deep Learning Enabled Arabic Sign Language Recognition for Speaking and Hearing Disability Persons.
- Author
-
Marzouk, Radwa, Alrowais, Fadwa, Al-Wesabi, Fahd N., and Hilal, Anwer Mustafa
- Subjects
DEEP learning ,DIGITAL image processing ,COMPUTER simulation ,SPEECH disorders ,SIGN language ,DATABASE management ,HEARING disorders ,COMMUNICATION ,BODY language ,ALGORITHMS - Abstract
Sign language has played a crucial role in the lives of impaired people having hearing and speaking disabilities. They can send messages via hand gesture movement. Arabic Sign Language (ASL) recognition is a very difficult task because of its high complexity and the increasing intraclass similarity. Sign language may be utilized for the communication of sentences, letters, or words using diverse signs of the hands. Such communication helps to bridge the communication gap between people with hearing impairment and other people and also makes it easy for people with hearing impairment to express their opinions. Recently, a large number of studies have been ongoing in developing a system that is capable of classifying signs of dissimilar sign languages into the given class. Therefore, this study designs an atom search optimization with a deep convolutional autoencoder-enabled sign language recognition (ASODCAE-SLR) model for speaking and hearing disabled persons. The presented ASODCAE-SLR technique mainly aims to assist the communication of speaking and hearing disabled persons via the SLR process. To accomplish this, the ASODCAE-SLR technique initially pre-processes the input frames by a weighted average filtering approach. In addition, the ASODCAE-SLR technique employs a capsule network (CapsNet) feature extractor to produce a collection of feature vectors. For the recognition of sign language, the DCAE model is exploited in the study. At the final stage, the ASO algorithm is utilized as a hyperparameter optimizer which in turn increases the efficacy of the DCAE model. The experimental validation of the ASODCAE-SLR model is tested using the Arabic Sign Language dataset. The simulation analysis exhibit the enhanced performance of the ASODCAE-SLR model compared to existing models. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
30. Hybrid Deep Learning Enabled Intrusion Detection in Clustered IIoT Environment.
- Author
-
Marzouk, Radwa, Alrowais, Fadwa, Negm, Noha, Alkhonaini, Mimouna Abdullah, Hamza, Manar Ahmed, Rizwanullah, Mohammed, Yaseen, Ishfaq, and Motwakel, Abdelwahed
- Subjects
INTRUSION detection systems (Computer security) ,DEEP learning ,CONVOLUTIONAL neural networks ,INTERNET of things ,DESIGN techniques - Abstract
Industrial Internet of Things (IIoT) is an emerging field which connects digital equipment as well as services to physical systems. Intrusion detection systems (IDS) can be designed to protect the system from intrusions or attacks. In this view, this paper presents a novel hybrid deep learning with metaheuristics enabled intrusion detection (HDL-MEID) technique for clustered IIoT environments. The HDL-MEID model mainly intends to organize the IIoT devices into clusters and enabled secure communication. Primarily, the HDL-MEID technique designs a new chaotic mayfly optimization (CMFO) based clustering approach for the effective choice of the Cluster Heads (CH) and organize clusters. Moreover, equilibrium optimizer with hybrid convolutional neural network long short-term memory (HCNNLSTM) based classification model is derived to identify the existence of the intrusions in the IIoT environment. Extensive experimental analysis is performed to highlight the enhanced outcomes of the HDL-MEID technique and the results were investigated under different aspects. The experimental results highlight the supremacy of the proposed HDL-MEID technique over recent state-of-the-art techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
31. Artificial Intelligence Based Data Offloading Technique for Secure MEC Systems.
- Author
-
Alrowais, Fadwa, Almasoud, Ahmed S., Marzouk, Radwa, Al-Wesabi, Fahd N., Hilal, Anwer Mustafa, Rizwanullah, Mohammed, Motwakel, Abdelwahed, and Yaseen, Ishfaq
- Subjects
ARTIFICIAL intelligence ,ARTIFICIAL neural networks ,MOBILE computing ,DATABASES ,DEEP learning - Abstract
Mobile edge computing (MEC) provides effective cloud services and functionality at the edge device, to improve the quality of service (QoS) of end users by offloading the high computation tasks. Currently, the introduction of deep learning (DL) and hardware technologies paves amethod in detecting the current traffic status, data offloading, and cyberattacks in MEC. This study introduces an artificial intelligence with metaheuristic based data offloading technique for Secure MEC (AIMDO-SMEC) systems. The proposed AIMDO-SMEC technique incorporates an effective traffic prediction module using Siamese Neural Networks (SNN) to determine the traffic status in the MEC system. Also, an adaptive sampling cross entropy (ASCE) technique is utilized for data offloading in MEC systems. Moreover, the modified salp swarm algorithm (MSSA) with extreme gradient boosting (XGBoost) technique was implemented to identification and classification of cyberattack that exist in the MEC systems. For examining the enhanced outcomes of the AIMDO-SMEC technique, a comprehensive experimental analysis is carried out and the results demonstrated the enhanced outcomes of the AIMDOSMEC technique with the minimal completion time of tasks (CTT) of 0.680. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
32. Deep Transfer Learning Enabled Intelligent Object Detection for Crowd Density Analysis on Video Surveillance Systems.
- Author
-
Alrowais, Fadwa, Alotaibi, Saud S., Al-Wesabi, Fahd N., Negm, Noha, Alabdan, Rana, Marzouk, Radwa, Mehanna, Amal S., and Al Duhayyim, Mesfer
- Subjects
VIDEO surveillance ,DEEP learning ,CONVOLUTIONAL neural networks ,MACHINE learning ,FEATURE extraction ,COMPUTER vision - Abstract
Object detection is a computer vision based technique which is used to detect instances of semantic objects of a particular class in digital images and videos. Crowd density analysis is one of the commonly utilized applications of object detection. Since crowd density classification techniques face challenges like non-uniform density, occlusion, inter-scene, and intra-scene deviations, convolutional neural network (CNN) models are useful. This paper presents a Metaheuristics with Deep Transfer Learning Enabled Intelligent Crowd Density Detection and Classification (MDTL-ICDDC) model for video surveillance systems. The proposed MDTL-ICDDC technique mostly concentrates on the effective identification and classification of crowd density on video surveillance systems. In order to achieve this, the MDTL-ICDDC model primarily leverages a Salp Swarm Algorithm (SSA) with NASNetLarge model as a feature extraction in which the hyperparameter tuning process is performed by the SSA. Furthermore, a weighted extreme learning machine (WELM) method was utilized for crowd density and classification process. Finally, the krill swarm algorithm (KSA) is applied for an effective parameter optimization process and thereby improves the classification results. The experimental validation of the MDTL-ICDDC approach was carried out with a benchmark dataset, and the outcomes are examined under several aspects. The experimental values indicated that the MDTL-ICDDC system has accomplished enhanced performance over other models such as Gabor, BoW-SRP, Bow-LBP, GLCM-SVM, GoogleNet, and VGGNet. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
33. Optimal Machine Learning Based Privacy Preserving Blockchain Assisted Internet of Things with Smart Cities Environment.
- Author
-
Al-Qarafi, A., Alrowais, Fadwa, S. Alotaibi, Saud, Nemri, Nadhem, Al-Wesabi, Fahd N., Al Duhayyim, Mesfer, Marzouk, Radwa, Othman, Mahmoud, and Al-Shabi, M.
- Subjects
SMART cities ,INTERNET of things ,MACHINE learning ,BLOCKCHAINS ,INTRUSION detection systems (Computer security) ,URBAN planning ,FEATURE selection - Abstract
Currently, the amount of Internet of Things (IoT) applications is enhanced for processing, analyzing, and managing the created big data from the smart city. Certain other applications of smart cities were location-based services, transportation management, and urban design, amongst others. There are several challenges under these applications containing privacy, data security, mining, and visualization. The blockchain-assisted IoT application (BIoT) is offering new urban computing to secure smart cities. The blockchain is a secure and transparent data-sharing decentralized platform, so BIoT is suggested as the optimum solution to the aforementioned challenges. In this view, this study develops an Optimal Machine Learning-based Intrusion Detection System for Privacy Preserving BIoT with Smart Cities Environment, called OMLIDS-PBIoT technique. The presented OMLIDS-PBIoT technique exploits BC and ML techniques to accomplish security in the smart city environment. For attaining this, the presented OMLIDS-PBIoT technique employs data pre-processing in the initial stage to transform the data into a compatible format. Moreover, a golden eagle optimization (GEO)-based feature selection (FS) model is designed to derive useful feature subsets. In addition, a heap-based optimizer (HBO) with random vector functional link network (RVFL) model was utilized for intrusion classification. Additionally, blockchain technology is exploited for secure data transmission in the IoT-enabled smart city environment. The performance validation of the OMLIDS-PBIoT technique is carried out using benchmark datasets, and the outcomes are inspected under numerous factors. The experimental results demonstrate the superiority of the OMLIDS-PBIoT technique over recent approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
34. Squirrel Search Optimization with Deep Transfer Learning-Enabled Crop Classification Model on Hyperspectral Remote Sensing Imagery.
- Author
-
Hamza, Manar Ahmed, Alrowais, Fadwa, Alzahrani, Jaber S., Mahgoub, Hany, Salem, Nermin M., and Marzouk, Radwa
- Subjects
REMOTE sensing ,HYPERSPECTRAL imaging systems ,COMPUTER algorithms ,COMPUTER vision ,PRECISION farming ,SPECTRAL sensitivity ,DEEP learning ,MINERAL dusts - Abstract
With recent advances in remote sensing image acquisition and the increasing availability of fine spectral and spatial information, hyperspectral remote sensing images (HSI) have received considerable attention in several application areas such as agriculture, environment, forestry, and mineral mapping, etc. HSIs have become an essential method for distinguishing crop classes and accomplishing growth information monitoring for precision agriculture, depending upon the fine spectral response to the crop attributes. The recent advances in computer vision (CV) and deep learning (DL) models allow for the effective identification and classification of different crop types on HSIs. This article introduces a novel squirrel search optimization with a deep transfer learning-enabled crop classification (SSODTL-CC) model on HSIs. The proposed SSODTL-CC model intends to identify the crop type in HSIs properly. To accomplish this, the proposed SSODTL-CC model initially derives a MobileNet with an Adam optimizer for the feature extraction process. In addition, an SSO algorithm with a bidirectional long-short term memory (BiLSTM) model is employed for crop type classification. To demonstrate the better performance of the SSODTL-CC model, a wide-ranging experimental analysis is performed on two benchmark datasets, namely dataset-1 (WHU-Hi-LongKou) and dataset-2 (WHU-Hi-HanChuan). The comparative analysis pointed out the better outcomes of the SSODTL-CC model over other models with a maximum of 99.23% and 97.15% on test datasets 1 and 2, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
35. Optimal Deep Learning Enabled Prostate Cancer Detection Using Microarray Gene Expression.
- Author
-
Alshareef, Abdulrhman M., Alsini, Raed, Alsieni, Mohammed, Alrowais, Fadwa, Marzouk, Radwa, Abunadi, Ibrahim, and Nemri, Nadhem
- Subjects
DEEP learning ,EARLY detection of cancer ,PROSTATE cancer ,GENE expression ,ARTIFICIAL intelligence ,FEATURE selection - Abstract
Prostate cancer is the main cause of death over the globe. Earlier detection and classification of cancer is highly important to improve patient health. Previous studies utilized statistical and machine learning (ML) techniques for prostate cancer detection. However, several challenges that exist in the investigation process are the existence of high dimensionality data and less number of training samples. Metaheuristic algorithms can be used to resolve the curse of dimensionality and improve the detection rate of artificial intelligence (AI) techniques. With this motivation, this article develops an artificial intelligence based feature selection with deep learning model for prostate cancer detection (AIFSDL-PCD) using microarray gene expression data. The AIFSDL-PCD technique involves preprocessing to enhance the input data quality. In addition, a chaotic invasive weed optimization (CIWO) based feature selection (FS) technique for choosing an optimal subset of features shows the novelty of the work. Moreover, the deep neural network (DNN) model can be applied as a classification model to detect the existence of prostate cancer in the microarray gene expression data. Furthermore, the hyperparameters of the DNN model can be effectively adjusted by the use of RMSprop optimizer. The design of CIWO based FS technique helps for reducing the computational complexity and improve the classification accuracy. The experimental results highlighted the betterment of the AIFSDL-PCD approach on the other techniques with respect to distinct measures. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
36. Energy efficient multi-hop routing protocol for smart vehicle monitoring using intelligent sensor networks.
- Author
-
Teekaraman, Yuvaraja, Manoharan, Hariprasath, Kuppusamy, Ramya, Urooj, Shabana, and Alrowais, Fadwa
- Subjects
WIRELESS sensor networks ,INTELLIGENT sensors ,SENSOR networks ,INTELLIGENT networks ,GLOBAL Positioning System ,BIOSENSORS - Abstract
This article focuses on intensifying in-vehicle biological wireless sensor networks for the persistence of monitoring the information on a precise vehicle. The wireless sensor networks will have enormous amount of nodules which are interrelated with each other. Therefore, these wireless sensor networks can be installed on a vehicle not only for monitoring perseverance but also for corroborating security with the support of a Global Positioning System expedient. In addition, the projected work focuses on reliable communiqué which is defined in terms of network reliability with discrepancy in reporting rate at each base station. To validate the efficiency of the proposed scheme, the simulation has been abetted using network simulator (NS2) and the outcomes indicate that when the sensors are installed, a robust system can be obtained with improved data transfer between the base stations. Moreover, a fortified in-vehicular sensor can be fixed in each vehicle with minimized path loss. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
37. Using Artificial Intelligence for Optimizing Natural Frequency of Recycled Concrete for Mechanical Machine Foundation.
- Author
-
Lashin, Maha M. A., Khokhar, Aamir, Alrowais, Fadwa, Malibari, Areej, and Saleh, Wafaa
- Subjects
CONCRETE ,ARTIFICIAL intelligence ,FUZZY control systems ,MACHINE foundations ,RUBBER - Abstract
This paper investigates the mechanical properties of two different types of recycled concrete, which use wood and rubber, relative to those characteristics of pure concrete, in terms of maximum load and natural frequencies. This paper contributes to the state of the art in this area in a number of ways. Firstly, the paper provides furtherance to the progressively growing literature in the field of recycled concrete and mechanical properties of materials. Secondly, the paper investigates the mechanical properties of two different types of recycled concrete by means of investigating the natural frequency of the samples, which is a new contribution. Lastly, the results from predicting the natural frequencies of concrete using fuzzy logic have been effectively assessed and compared with the analytical results. Results from the study show that the pure concrete samples produced maximum natural frequency, then concrete samples with wood, and lastly, concrete samples with rubber. The tolerance between the lab test results and fuzzy logic is approximately 5%. These results could have significant implications for furthering recycled concrete research and for designing machine foundations. Evidence of the applicability of fuzzy logic as a predictive and analysis tool for the mechanical properties of recycled concrete are discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
38. Early Detection of Alzheimer's Disease Using Polar Harmonic Transforms and Optimized Wavelet Neural Network.
- Author
-
Urooj, Shabana, Singh, Satya P., Malibari, Areej, Alrowais, Fadwa, Kalathil, Shaeen, and Hu, Yahan
- Subjects
ALZHEIMER'S disease ,WAVELET transforms ,MILD cognitive impairment ,MAGNETIC resonance imaging ,DIFFERENTIAL evolution ,SELF-adaptive software ,HOUGH transforms - Abstract
Effective and accurate diagnosis of Alzheimer's disease (AD), as well as early-stage detection, has gained more and more attention in recent years. For AD classification, we propose a new hybrid method for early detection of Alzheimer's disease (AD) using Polar Harmonic Transforms (PHT) and Self-adaptive Differential Evolution Wavelet Neural Network (SaDE-WNN). The orthogonal moments are used for feature extraction from the grey matter tissues of structural Magnetic Resonance Imaging (MRI) data. Irrelevant features are removed by the feature selection process through evaluating the in-class and among-class variance. In recent years, WNNs have gained attention in classification tasks; however, they suffer from the problem of initial parameter tuning, parameter setting. We proposed a WNN with the self-adaptation technique for controlling the Differential Evolution (DE) parameters, i.e., the mutation scale factor (F) and the cross-over rate (CR). Experimental results on the Alzheimer's disease Neuroimaging Initiative (ADNI) database indicate that the proposed method yields the best overall classification results between AD and mild cognitive impairment (MCI) (93.7% accuracy, 86.0% sensitivity, 98.0% specificity, and 0.97 area under the curve (AUC)), MCI and healthy control (HC) (92.9% accuracy, 95.2% sensitivity, 88.9% specificity, and 0.98 AUC), and AD and HC (94.4% accuracy, 88.7% sensitivity, 98.9% specificity and 0.99 AUC). [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
39. Safety Maintains Lean Sustainability and Increases Performance through Fault Control.
- Author
-
Elattar, Samia, Abed, Ahmed M., and Alrowais, Fadwa
- Subjects
ARTIFICIAL neural networks ,ENVIRONMENTAL health ,FAULT trees (Reliability engineering) ,SAFETY ,SUSTAINABILITY - Abstract
Almost every industrial and service enterprise adopts some form of Environmental Health and Safety (HSE) practices. However, there is no unified measurement implementation framework to resist losses exacerbated due to the "lack of safety precautions", which must be considered one of the most dangerous Lean wastes because it jeopardizes the investment in the Hex-Bottom-Line (HBLs). Despite the widespread nature of the Lean approach, there no unified and collected framework to track and measure the effectiveness of the safety measures' progress. Therefore, the enterprises resort to establishing their own tailored safety framework that maintains their competitiveness and sustainability. The enterprises must provide insight into safety deficiencies (i.e., faults and losses suffered) that have been measured via downtime spans and costs (Lean waste), reflecting the poor Lean Safety Performance Level (LSPL). This paper aims to shed light on two issues: (1) the adverse impact of the "lack of safety precautions" on LSPL caused by the absence of (2) a Lean Safety framework included in the Measurement and Analysis phases of Define Measure Analyze Identify Control (DMAIC). This framework is based on forecasting losses and faults according to their consumption time. The proposed framework appreciates the losses' severity (time consumption and costs) via Fault Mode and Effect Forecasting (FMEF) aided by Artificial Neural Networks through sequential steps known as Safety Function Deployment (SFD). [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
40. A Two Consequent Multi-layers Deep Discriminative Approach for Classifying fMRI Images.
- Author
-
Mahmoud, Abeer M., Karamti, Hanen, and Alrowais, Fadwa
- Subjects
CONVOLUTIONAL neural networks ,FUNCTIONAL magnetic resonance imaging ,MACHINE learning - Abstract
Functional Magnetic Resonance Imaging (fMRI), for many decades acts as a potential aiding method for diagnosing medical problems. Several successful machine learning algorithms have been proposed in literature to extract valuable knowledge from fMRI. One of these algorithms is the convolutional neural network (CNN) that competent with high capabilities for learning optimal abstractions of fMRI. This is because the CNN learns features similarly to human brain where it preserves local structure and avoids distortion of the global feature space. Focusing on the achievements of using the CNN for the fMRI, and accordingly, the Deep Convolutional Auto-Encoder (DCAE) benefits from the data-driven approach with CNN's optimal features to strengthen the fMRI classification. In this paper, a new two consequent multi-layers DCAE deep discriminative approach for classifying fMRI Images is proposed. The first DCAE is unsupervised sub-model that is composed of four CNN. It focuses on learning weights to utilize discriminative characteristics of the extracted features for robust reconstruction of fMRI with lower dimensional considering tiny details and refining by its deep multiple layers. Then the second DCAE is a supervised sub-model that focuses on training labels to reach an outperformed results. The proposed approach proved its effectiveness and improved literately reported results on a large brain disorder fMRI dataset. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
41. Dynamic Gesture Controlled User Interface Expert HCI System using Adaptative Background Masking: An Aid to Prevent Cross Infections.
- Author
-
RAWAT, SEEMA, KUMAR, PRAVEEN, SINGH, ISHITA, BANERJEE, SHOURYA, UROOJ, SHABANA, and ALROWAIS, FADWA
- Subjects
CROSS infection ,CONVOLUTIONAL neural networks ,USER interfaces ,EXPERT systems ,GESTURE - Abstract
Human-Computer Interaction (HCI) interfaces need unambiguous instructions in the form of mouse clicks or keyboard taps from the user and thus gets complex. To simplify this monotonous task, a real-time hand gesture recognition method using computer vision, image, and video processing techniques has been proposed. Controlling infections has turned out to be the major concern of the healthcare environment. Several input devices such as keyboards, mouse, touch screens can be considered as a breeding ground for various micro pathogens and bacteria. Direct use of hands as an input device is an innovative method for providing natural HCI ensuring minimal physical contact with the devices i.e., less transmission of bacteria and thus can prevent cross infections. Convolutional Neural Network (CNN) has been used for object detection and classification. CNN architecture for 3d object recognition has been proposed which consists of two models: 1) A detector, a CNN architecture for detection of gestures; and 2) A classifier, a CNN for classification of the detected gestures. By using dynamic hand gesture recognition to interact with the system, the interactions can be increased with the help of multidimensional use of hand gestures as compared to other input methods. The dynamic hand gesture recognition method focuses to replace the mouse for interaction with the virtual objects. This work centralises the efforts of implementing a method that employs computer vision algorithms and gesture recognition techniques for developing a low-cost interface device for interacting with objects in the virtual environment such as screens using hand gestures. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
42. Design and Implementation of Quad-Port MIMO Antenna with Dual-Band Elimination Characteristics for Ultra-Wideband Applications.
- Author
-
Kumar, Pawan, Urooj, Shabana, and Alrowais, Fadwa
- Subjects
MULTIFREQUENCY antennas ,ANTENNA design ,ULTRA-wideband antennas ,LOW Temperature Cofired Ceramic technology ,ULTRA-wideband devices ,PLANAR antennas ,RESONATORS ,ANTENNAS (Electronics) - Abstract
A planar, microstrip line-fed, quad-port, multiple-input-multiple-output (MIMO) antenna with dual-band rejection features is proposed for ultra-wideband (UWB) applications. The proposed MIMO antenna design consists of four identical octagonal-shaped radiating elements, which are placed orthogonally to each other. The dual-band rejection property (3.5 GHz and 5.5 GHz corresponding to Wi-MAX and WLAN bands) was obtained by introducing a hexagonal-shaped complementary split-ring resonator (HCSRR) in the radiators of the designed antenna. The MIMO antenna was etched on low-cost FR-4 dielectric substrate of size 58 × 58 × 0.8 mm
3 . Isolation higher than 18 dB and envelope correlation coefficient (ECC) lesser than 0.07 was observed for the MIMO/diversity antenna in the operating range of 3–16 GHz. The presented four-port UWB MIMO antenna configuration was fabricated, and the experimental results validate the simulation outcomes. [ABSTRACT FROM AUTHOR]- Published
- 2020
- Full Text
- View/download PDF
43. Recent Development in Disease Diagnosis by Information, Communication and Technology.
- Author
-
UROOJ, SHABANA, SHARMA, ASTHA, SINHA, CHITRANSH, and ALROWAIS, FADWA
- Subjects
TELECOMMUNICATION ,POVERTY reduction ,DIAGNOSIS ,BRAIN diseases ,MACHINE learning ,ARTIFICIAL intelligence - Abstract
The usage of Information, Communication and Technology (ICT) in health sector has a great potential in improving the health of individuals and communities, disease detection, prevention and overall strengthening the healthcare systems, vital for development and poverty reduction. Large ICT establishments offer a variety of Artificial Intelligence (AI) based solutions; and their tenacities are inclusive of wearable therapeutic devices, healthcare management arrangements, extrapolative healthcare diagnostics, ailment prevention systems, detection and screening of diseases and automated tactics. In the field of healthcare related instrumentation, AI plays a prevalent role with the amalgamation of several technological progressions. This enables machines to sense, comprehend, act and learn to perform organisational and clinical healthcare functions as well as serves the research and training purposes. Additionally, it enables to accomplish the anticipated directorial and medicinal benefits. The major causes of life threats reported in literature are; heart and brain diseases. In this paper, an extensive review is presented exploring the evolving ICT technologies in machine learning and AI to help ICT enthusiasts to be able to catch up with the emerging trends in healthcare. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
44. Correcting Errors in Color Image Encryption Algorithm Based on Fault Tolerance Technique.
- Author
-
Mohamed, Heba G., Alrowais, Fadwa, and ElKamchouchi, Dalia H.
- Subjects
FAULT-tolerant computing ,IMAGE encryption ,MULTIMEDIA communications ,INFORMATION technology security ,TELECOMMUNICATION ,ALGORITHMS - Abstract
Security standards have been raised through modern multimedia communications technology, which allows for enormous progress in security. Modern multimedia communication technologies are concerned with fault tolerance technique and information security. As a primary method, there is widespread use of image encryption to protect image information security. Over the past few years, image encryption has paid more attention to combining DNA technologies in order to increase security. The objective here is to provide a new method for correcting color image encryption errors due to the uncertainty of DNA computing by using the fractional order hyperchaotic Lorenz system. To increase randomness, the proposed cryptosystem is applied to the three plain image channels: Red, Green, and Blue. Several methods were compared including the following: entropy, correlation, key sensitivity, key space, data loss attacks, speed computation, Number of Pixel changing rate (NPCR), and Unified Average Change Intensity randomness (UACI) tests. Consequently, the proposed scheme is very secure against a variety of cryptographic attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
45. IoT Based Electric Vehicle Application Using Boosting Algorithm for Smart Cities.
- Author
-
Urooj, Shabana, Alrowais, Fadwa, Teekaraman, Yuvaraja, Manoharan, Hariprasath, Kuppusamy, Ramya, Ferreira, Joao, and Bayram, Islam Safak
- Subjects
- *
BOOSTING algorithms , *SMART cities , *ELECTRIC vehicles , *ELECTRIC vehicle batteries , *INTERNET of things , *PLUG-in hybrid electric vehicles - Abstract
The application of Internet of Things (IoT) has been emerging as a new platform in wireless technologies primarily in the field of designing electric vehicles. To overcome all issues in existing vehicles and for protecting the environment, electric vehicles should be introduced by integrating an intellectual device called sensor all over the body of electric vehicle with less cost. Therefore, this article confers the need and importance of introducing electric vehicles with IoT based technology which monitors the battery life of electric vehicles. Since the electric vehicles are implemented with internet, an online monitoring system which is called Things Speak has been used for monitoring all the vehicles in a continuous manner (day-by-day). These online results will then be visualized in MATLAB after an effective boosting algorithm is integrated with objective function. The efficiency of proposed method is tested by visual analysis and performance results prove that the projected method on electric vehicle is improved when using IoT based technology. It is also observed that cost of implementation is lesser and capacity of electric vehicle is increased to about 74.3% after continuous monitoring with sensors. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
46. New Gen Controlling Variable Using Dragonfly Algorithm in PV Panel.
- Author
-
Urooj, Shabana, Alrowais, Fadwa, Kuppusamy, Ramya, Teekaraman, Yuvaraja, and Manoharan, Hariprasath
- Subjects
- *
MAXIMUM power point trackers , *RENEWABLE energy sources , *ENERGY shortages , *TRACKING algorithms , *SOLAR energy , *ODONATA , *MATHEMATICAL optimization - Abstract
In the present scenario the depletion of conventional sources causes an energy crisis. The energy crisis causes load demand with respect to electricity. The use of renewable energy sources plays a vital role in reducing the energy crisis and in reduction of CO2 emission. The use of solar energy is the major source of power in generation as this is the root cause for the development of wind, tides, etc. However, due to climatic condition the availability of PV sources varies from time to time. Hence it is essential to track the maximum source of energy by implementing different types of MPPT algorithms. However, use of MPPT algorithms has the limitation of using the same during partial shadow conditions. The issue of tracking power under partial shadow conditions can be resolved by implementing an intelligent optimization tracking algorithm which involves a computation process. Though many of nature's inspired algorithms were present to address real world problems, Mirjalili developed the dragonfly algorithm to provide a better optimization solution to the issues faced in real-time applications. The proposed concept focuses on the implementation of the dragonfly optimization algorithm to track the maximum power from solar and involves the concept of machine learning, image processing, and data computation. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
47. The Neural Network Revamping the Process's Reliability in Deep Lean via Internet of Things.
- Author
-
Abed, Ahmed M., Elattar, Samia, Gaafar, Tamer S., and Alrowais, Fadwa Moh.
- Subjects
INTERNET of things ,MANUFACTURING processes ,EDDIES ,RELIABILITY in engineering ,BUBBLES - Abstract
Deep lean is a novel approach that is concerned with the profound analysis for waste's behavior at hidden layers in manufacturing processes to enhance processes' reliability level at the upstream. Ideal Standard Co. for bathtubs suffered from defects and cost losses in the spraying section, due to differences in the painting cover thickness due to bubbles, caused by eddies, which move toward the bathtubs through hoses. These bubbles and their movement are considered as a form of lean's waste. The spraying liquid inside the tanks and hoses must move with uniform velocity, viscosity, pressure, feed rate and suitable Reynolds circulation values to eliminate the eddy causes. These factors are tackled through the adoption Internet of Things (IoT) technologies that are aided by neural networks (NN) when an abnormal flow rate is detected using sensor data in real-time that can reduce the defects. The NN aimed at forecasting eddies' movement lines that carry bubbles and works on being blasted before entering the hoses through using Design of Experiment (DOE). This paper illustrates a deep lean perspective as driven by the define, measure, analysis, improvement and control (DMAIC) methodology to improve reliability. The eddy moves downstream slowly with an anti-clockwise flow for some of the optimal values for the influencing factors, whereas the circulation of Ω increases, whether for vertical or horizontal travel. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
48. Design of Quad-Port MIMO/Diversity Antenna with Triple-Band Elimination Characteristics for Super-Wideband Applications.
- Author
-
Kumar, Pawan, Urooj, Shabana, and Alrowais, Fadwa
- Subjects
ANTENNAS (Electronics) ,RESONATORS - Abstract
A compact, low-profile, coplanar waveguide (CPW)-fed quad-port multiple-input–multiple-output (MIMO)/diversity antenna with triple band-notched (Wi-MAX, WLAN, and X-band) characteristics is proposed for super-wideband (SWB) applications. The proposed design contains four similar truncated–semi-elliptical–self-complementary (TSESC) radiating patches, which are excited through tapered CPW feed lines. A complementary slot matching the radiating patch is introduced in the ground plane of the truncated semi-elliptical antenna element to obtain SWB. The designed MIMO/diversity antenna displays a bandwidth ratio of 31:1 and impedance bandwidth (|S
11 | ≤ − 10 dB) of 1.3–40 GHz. In addition, a complementary split-ring resonator (CSRR) is implanted in the resonating patch to eliminate WLAN (5.5 GHz) and X-band (8.5 GHz) signals from SWB. Further, an L-shaped slit is used to remove Wi-MAX (3.5 GHz) band interferences. The MIMO antenna prototype is fabricated, and a good agreement is achieved between the simulated and experimental outcomes. [ABSTRACT FROM AUTHOR]- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.