Open Access. Powered by Scholars. Published by Universities.®

Computational Neuroscience Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Computational Neuroscience

Unraveling The Versatility And Impact Of Multi-Objective Optimization: Algorithms, Applications, And Trends For Solving Complex Real-World Problems, Noor A. Rashed, Yossra H. Ali, Tarik A. Rashid, A. Salih Jun 2024

Unraveling The Versatility And Impact Of Multi-Objective Optimization: Algorithms, Applications, And Trends For Solving Complex Real-World Problems, Noor A. Rashed, Yossra H. Ali, Tarik A. Rashid, A. Salih

Journal of Soft Computing and Computer Applications

Multi-Objective Optimization (MOO) techniques have become increasingly popular in recent years due to their potential for solving real-world problems in various fields, such as logistics, finance, environmental management, and engineering. These techniques offer comprehensive solutions that traditional single-objective approaches fail to provide. Due to the many innovative algorithms, it has been challenging for researchers to choose the optimal algorithms for solving their problems. This paper examines recently developed MOO-based algorithms. MOO is introduced along with Pareto optimality and trade-off analysis. In real-world case studies, MOO algorithms address complicated decision-making challenges. This paper examines algorithmic methods, applications, trends, and issues in …


Optimization Of Resources Allocation Using Evolutionary Deep Learning, Sanaa Ali Jabber, Soukaena H. Hashem, Shatha H. Jafer Jun 2024

Optimization Of Resources Allocation Using Evolutionary Deep Learning, Sanaa Ali Jabber, Soukaena H. Hashem, Shatha H. Jafer

Journal of Soft Computing and Computer Applications

The Bidirectional Long Short-Term Memory (Bi-LSTM) network structure enables data analysis, enhances decision-making processes, and optimizes resource allocation in cloud computing systems. However, achieving peak network performance relies heavily on choosing the hyperparameters for configuring the network. Enhancing resource allocation improves the Service Level Agreement (SLA) by ensuring efficient utilization and allocation of computational resources based on dynamic workload demands. This paper proposes an approach that integrates a Multi-Objective Evolutionary Algorithm (MOEA) with deep learning techniques to address this challenge. This approach combines the optimization capabilities of MOEA with the learning predictive models to establish a framework for resource allocation …


Face Mask Detection Based On Deep Learning: A Review, Shahad Fadhil Abbas, Shaimaa Hameed Shaker, Firas. A. Abdullatif Jun 2024

Face Mask Detection Based On Deep Learning: A Review, Shahad Fadhil Abbas, Shaimaa Hameed Shaker, Firas. A. Abdullatif

Journal of Soft Computing and Computer Applications

The coronavirus disease 2019 outbreak caused widespread disruption. The World Health Organization has recommended wearing face masks, along with other public health measures, such as social distancing, following medical guidelines, and thermal scanning, to reduce transmission, reduce the burden on healthcare systems, and protect population groups. However, wearing a mask, which acts as a barrier or shield to reduce transmission of infection from infected individuals, hides most facial features, such as the nose, mouth, and chin, on which face detection systems depend, which leads to the weakness of these systems. This paper aims to provide essential insights for researchers and …


Strangeness Detection From Crowded Video Scenes By Hand-Crafted And Deep Learning Features, Ali A. Hussan, Shaimaa H. Shaker, Akbas Ezaldeen Ali Jun 2024

Strangeness Detection From Crowded Video Scenes By Hand-Crafted And Deep Learning Features, Ali A. Hussan, Shaimaa H. Shaker, Akbas Ezaldeen Ali

Journal of Soft Computing and Computer Applications

Video anomaly detection is one of the trickiest issues in intelligent video surveillance because of the complexity of real data and the hazy definition of anomalies. Since abnormal occurrences typically seem different from normal events and move differently. The global optical flow was determined with the maximum accuracy and speed using the Farneback approach for calculating the magnitudes. Two approaches have been used in this study to detect strangeness in the video. These approaches are Deep Learning (DL) and manuality. The first method uses the activity map's development of entropy to detect the oddity in the video using a particular …


A Comprehensive Analysis Of Deep Learning And Swarm Intelligence Techniques To Enhance Vehicular Ad-Hoc Network Performance, Hussein K. Abdul Atheem, Israa T. Ali, Faiz A. Al Alawy Jun 2024

A Comprehensive Analysis Of Deep Learning And Swarm Intelligence Techniques To Enhance Vehicular Ad-Hoc Network Performance, Hussein K. Abdul Atheem, Israa T. Ali, Faiz A. Al Alawy

Journal of Soft Computing and Computer Applications

The primary elements of Intelligent Transportation Systems (ITSs) have become Vehicular Ad-hoc NETworks (VANETs), allowing communication between the infrastructure environment and vehicles. The large amount of data gathered by connected vehicles has simplified how Deep Learning (DL) techniques are applied in VANETs. DL is a subfield of artificial intelligence that provides improved learning algorithms able to analyzing and process complex and heterogeneous data. This study explains the power of DL in VANETs, considering applications like decision-making, vehicle localization, anomaly detection, traffic prediction and intelligent routing, various types of DL, including Recurrent Neural Networks (RNNs), and Convolutional Neural Networks (CNNs) are …


A Novel Approach To Generate Dynamic S-Box For Lightweight Cryptography Based On The 3d Hindmarsh Rose Model, Ala'a Talib Khudhair, Abeer Tariq Maolood, Ekhlas Khalaf Gbashi Jun 2024

A Novel Approach To Generate Dynamic S-Box For Lightweight Cryptography Based On The 3d Hindmarsh Rose Model, Ala'a Talib Khudhair, Abeer Tariq Maolood, Ekhlas Khalaf Gbashi

Journal of Soft Computing and Computer Applications

In lightweight cryptography, the absence of an S-Box in some algorithms like speck, Tiny Encryption Algorithm, or the presence of a fixed S-Box in others like Advanced Encryption Standard can make them more vulnerable to attacks. This study introduces an innovative method for creating a dynamic 6-bit S-Box (8×8) in octal format. The generating process of S-Box passes through two phases. The first is the number initialization phase. This phase involves generating sequence numbers 1, sequence numbers 2, and sequence numbers 3 depending on Xi, Yi, and Zi values generated using the 3D Hindmarsh …


The Robust Digital Video Watermarking Methods: A Comparative Study, Ebtehal Talib, Abeer Salim Jamil, Nidaa Flaih Hassan, Muhammad Ehsan Rana Jun 2024

The Robust Digital Video Watermarking Methods: A Comparative Study, Ebtehal Talib, Abeer Salim Jamil, Nidaa Flaih Hassan, Muhammad Ehsan Rana

Journal of Soft Computing and Computer Applications

Digital data such as images, audio, and video have become widely available since the invention of the Internet. Due to the ease of access to this multimedia, challenges such as content authentication, security, copyright protection, and ownership determination arose. In this paper, an explanation of watermark techniques, embedding, and extraction methods are provided. It further discusses the utilization of artificial intelligence methods and conversion of host media from the spatial domain to the frequency domain; these methods aim to improve the quality of watermarks. This paper also included a classification of the basic characteristics of the digital watermark and the …


Foxann: A Method For Boosting Neural Network Performance, Mahmood A. Jumaah, Yossra H. Ali, Tarik A. Rashid, S. Vimal Jun 2024

Foxann: A Method For Boosting Neural Network Performance, Mahmood A. Jumaah, Yossra H. Ali, Tarik A. Rashid, S. Vimal

Journal of Soft Computing and Computer Applications

Artificial neural networks play a crucial role in machine learning and there is a need to improve their performance. This paper presents FOXANN, a novel classification model that combines the recently developed Fox optimizer with ANN to solve ML problems. Fox optimizer replaces the backpropagation algorithm in ANN; optimizes synaptic weights; and achieves high classification accuracy with a minimum loss, improved model generalization, and interpretability. The performance of FOXANN is evaluated on three standard datasets: Iris Flower, Breast Cancer Wisconsin, and Wine. The results presented in this paper are derived from 100 epochs using 10-fold cross-validation, ensuring that all dataset …


Surveying Machine Learning In Cyberattack Datasets: A Comprehensive Analysis, Azhar F. Al-Zubidi, Alaa Kadhim Farhan, El-Sayed M. El-Kenawy Jun 2024

Surveying Machine Learning In Cyberattack Datasets: A Comprehensive Analysis, Azhar F. Al-Zubidi, Alaa Kadhim Farhan, El-Sayed M. El-Kenawy

Journal of Soft Computing and Computer Applications

Cyberattacks have become one of the most significant security threats that have emerged in the last couple of years. It is imperative to comprehend such attacks; thus, analyzing various kinds of cyberattack datasets assists in constructing the precise intrusion detection models. This paper tries to analyze many of the available cyberattack datasets and compare them with many of the fields that are used to detect and predict cyberattack, like the Internet of Things (IoT) traffic-based, network traffic-based, cyber-physical system, and web traffic-based. In the present paper, an overview of each of them is provided, as well as the course of …


Deep Learning-Based Framework For Autism Functional Mri Image Classification, Xin Yang, Saman Sarraf, Ning Zhang Jan 2018

Deep Learning-Based Framework For Autism Functional Mri Image Classification, Xin Yang, Saman Sarraf, Ning Zhang

Journal of the Arkansas Academy of Science

The purpose of this paper is to introduce deep learning-based framework LeNet-5 architecture and implement the experiments for functional MRI image classification of Autism spectrum disorder. We implement our experiments under the NVIDIA deep learning GPU Training Systems (DIGITS). By using the Convolutional Neural Network (CNN) LeNet-5 architecture, we successfully classified functional MRI image of Autism spectrum disorder from normal controls. The results show that we obtained satisfactory results for both sensitivity and specificity.