Preferred Language
Articles
/
CBadRIgBVTCNdQwCWXaU
Traffic Classification of IoT Devices by Utilizing Spike Neural Network Learning Approach
...Show More Authors

Whenever, the Internet of Things (IoT) applications and devices increased, the capability of the its access frequently stressed. That can lead a significant bottleneck problem for network performance in different layers of an end point to end point (P2P) communication route. So, an appropriate characteristic (i.e., classification) of the time changing traffic prediction has been used to solve this issue. Nevertheless, stills remain at great an open defy. Due to of the most of the presenting solutions depend on machine learning (ML) methods, that though give high calculation cost, where they are not taking into account the fine-accurately flow classification of the IoT devices is needed. Therefore, this paper presents a new model based on the Spike Neural Network (SNN) called IoT-Traffic Classification (IoT-TCSNN) to classify IoT devices traffic. The model consists of four phases: data preprocessing, feature extraction, classier and evaluation. The proposed model performance is evaluated according to evaluation metrics: accuracy, precision, recall and F1-score and energy usage in comparison with two models: ML based Support Vector Machine IoT-TCSVM and ML based Deep Neural Network (IoT-TCDNN). The evaluations result has been shown that IoT-TCSNN consumes less energy in contrast to IoT-TCDNN and IoT-TCSVM. Also, it gives high accuracy in comparison with IoT-TCSVM.

Scopus Crossref
View Publication
Publication Date
Fri May 01 2020
Journal Name
International Journal Of Advanced Science And Technology
Improved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval
...Show More Authors

Background/Objectives: The purpose of current research aims to a modified image representation framework for Content-Based Image Retrieval (CBIR) through gray scale input image, Zernike Moments (ZMs) properties, Local Binary Pattern (LBP), Y Color Space, Slantlet Transform (SLT), and Discrete Wavelet Transform (DWT). Methods/Statistical analysis: This study surveyed and analysed three standard datasets WANG V1.0, WANG V2.0, and Caltech 101. The features an image of objects in this sets that belong to 101 classes-with approximately 40-800 images for every category. The suggested infrastructure within the study seeks to present a description and operationalization of the CBIR system through automated attribute extraction system premised on CN

... Show More
Publication Date
Mon Oct 05 2020
Journal Name
International Journal Of Advanced Science And Technology
Improved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval
...Show More Authors

Improved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval

Publication Date
Sat Jul 28 2018
Journal Name
Journal Of Engineering
Effectiveness of Meso-Scale Approach in Modeling of Plain Concrete Beam
...Show More Authors

The main aim of this research paper is investigating the effectiveness and validity of Meso-Scale Approach (MSA) as a modern technique for the modeling of plain concrete beams. Simply supported plain concrete beam was subjected to two-point loading to detect the response in flexural. Experimentally, a concrete mix was designed and prepared to produce three similar standard concrete prisms for flexural testing. The coarse aggregate used in this mix was crushed aggregate. Numerical Finite Element Analysis (FEA) was conducted on the same concrete beam using the meso-scale modeling. The numerical model was constructed to be a bi-phasic material consisting of cement mortar and coarse aggregate. The interface between the two c

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu May 23 2019
Journal Name
The International Journal Of Artificial Organs
Real-time classification of shoulder girdle motions for multifunctional prosthetic hand control: A preliminary study
...Show More Authors

In every country in the world, there are a number of amputees who have been exposed to some accidents that led to the loss of their upper limbs. The aim of this study is to suggest a system for real-time classification of five classes of shoulder girdle motions for high-level upper limb amputees using a pattern recognition system. In the suggested system, the wavelet transform was utilized for feature extraction, and the extreme learning machine was used as a classifier. The system was tested on four intact-limbed subjects and one amputee, with eight channels involving five electromyography channels and three-axis accelerometer sensor. The study shows that the suggested pattern recognition system has the ability to classify the sho

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Mar 29 2024
Journal Name
Iraqi Journal Of Science
Evaluating the Performance and Behavior of CNN, LSTM, and GRU for Classification and Prediction Tasks
...Show More Authors

     Deep learning (DL) plays a significant role in several tasks, especially classification and prediction. Classification tasks can be efficiently achieved via convolutional neural networks (CNN) with a huge dataset, while recurrent neural networks (RNN) can perform prediction tasks due to their ability to remember time series data. In this paper, three models have been proposed to certify the evaluation track for classification and prediction tasks associated with four datasets (two for each task). These models are CNN and RNN, which include two models (Long Short Term Memory (LSTM)) and GRU (Gated Recurrent Unit). Each model is employed to work consequently over the two mentioned tasks to draw a road map of deep learning mod

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Classification and Construction of (k,3)-Arcs on Projective Plane Over Galois Field GF(7)
...Show More Authors

The purpose of this work is to study the classification and construction of (k,3)-arcs in the projective plane PG(2,7). We found that there are two (5,3)-arcs, four (6,3)-arcs, six (7,3)arcs, six (8,3)-arcs, seven (9,3)-arcs, six (10,3)-arcs and six (11,3)-arcs. All of these arcs are incomplete. The number of distinct (12,3)-arcs are six, two of them are complete. There are four distinct (13,3)-arcs, two of them are complete and one (14,3)-arc which is incomplete. There exists one complete (15,3)-arc.

Publication Date
Sat Jul 01 2017
Journal Name
Journal Of Construction Engineering And Management
Identification, Quantification, and Classification of Potential Safety Risk for Sustainable Construction in the United States
...Show More Authors

View Publication
Scopus (55)
Crossref (51)
Scopus Clarivate Crossref
Publication Date
Fri Jan 31 2025
Journal Name
Aip Conference Proceedings
Classification of oral cavity cancer using linear discriminant analysis (LDA) and principal component analysis (PCA)
...Show More Authors

View Publication
Crossref (1)
Scopus Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
An adaptive neural control methodology design for dynamics mobile robot
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More