46 results on '"Alsolami, Fawaz"'
Search Results
2. Prediction of breast cancer based on computer vision and artificial intelligence techniques
- Author
-
Irshad Khan, Asif, Abushark, Yoosef B., Alsolami, Fawaz, Almalawi, Abdulmohsen, Mottahir Alam, Md, Kshirsagar, Pravin, and Ahmad Khan, Raees
- Published
- 2023
- Full Text
- View/download PDF
3. Novel energy management scheme in IoT enabled smart irrigation system using optimized intelligence methods
- Author
-
Khan, Asif Irshad, Alsolami, Fawaz, Alqurashi, Fahad, Abushark, Yoosef B., and Sarker, Iqbal H.
- Published
- 2022
- Full Text
- View/download PDF
4. Spatiotemporal Graph Autoencoder Network for Skeleton-Based Human Action Recognition.
- Author
-
Abduljalil, Hosam, Elhayek, Ahmed, Marish Ali, Abdullah, and Alsolami, Fawaz
- Subjects
HUMAN activity recognition ,DEEP learning ,PATIENT monitoring ,ALGORITHMS ,SKELETON - Abstract
Human action recognition (HAR) based on skeleton data is a challenging yet crucial task due to its wide-ranging applications, including patient monitoring, security surveillance, and human- machine interaction. Although numerous algorithms have been proposed to distinguish between various activities, most practical applications require highly accurate detection of specific actions. In this study, we propose a novel, highly accurate spatiotemporal graph autoencoder network for HAR, designated as GA-GCN. Furthermore, an extensive investigation was conducted employing diverse modalities. To this end, a spatiotemporal graph autoencoder was constructed to automatically learn both spatial and temporal patterns from skeleton data. The proposed method achieved accuracies of 92.3% and 96.8% on the NTU RGB+D dataset for cross-subject and cross-view evaluations, respectively. On the more challenging NTU RGB+D 120 dataset, GA-GCN attained accuracies of 88.8% and 90.4% for cross-subject and cross-set evaluations. Overall, our model outperforms the majority of the existing state-of-the-art methods on these common benchmark datasets. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. AraFast: Developing and Evaluating a Comprehensive Modern Standard Arabic Corpus for Enhanced Natural Language Processing.
- Author
-
Alrayzah, Asmaa, Alsolami, Fawaz, and Saleh, Mostafa
- Subjects
ARABIC language ,TRANSFORMER models ,NATURAL language processing ,CORPORA - Abstract
The research presented in the following paper focuses on the effectiveness of a modern standard Arabic corpus, AraFast, in training transformer models for natural language processing tasks, particularly in Arabic. In the study described herein, four experiments were conducted to evaluate the use of AraFast across different configurations: segmented, unsegmented, and mini versions. The main outcomes of the present study are as follows: Transformer models trained with larger and cleaner versions of AraFast, especially in question-answering, indicate the impact of corpus quality and size on model efficacy. Secondly, a dramatic reduction in training loss was observed with the mini version of AraFast, underscoring the importance of optimizing corpus size for effective training. Moreover, the segmented text format led to a decrease in training loss, highlighting segmentation as a beneficial strategy in Arabic NLP. In addition, using the study findings, challenges in managing noisy data derived from web sources are identified, which were found to significantly hinder model performance. These findings collectively demonstrate the critical role of well-prepared, segmented, and clean corpora in advancing Arabic NLP capabilities. The insights from AraFast's application can guide the development of more efficient NLP models and suggest directions for future research in enhancing Arabic language processing tools. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Bi-criteria optimization problems for decision rules
- Author
-
Alsolami, Fawaz, Amin, Talha, Chikalov, Igor, and Moshkov, Mikhail
- Published
- 2018
- Full Text
- View/download PDF
7. Context pre-modeling: an empirical analysis for classification based user-centric context-aware predictive modeling
- Author
-
Sarker, Iqbal H., Alqahtani, Hamed, Alsolami, Fawaz, Khan, Asif Irshad, Abushark, Yoosef B., and Siddiqui, Mohammad Khubeb
- Published
- 2020
- Full Text
- View/download PDF
8. A Bee Colony-Based Optimized Searching Mechanism in the Internet of Things.
- Author
-
Ramzan, Muhammad Sher, Asghar, Anees, Ullah, Ata, Alsolami, Fawaz, and Ahmad, Iftikhar
- Subjects
INTERNET of things ,INTERNET searching ,HONEYBEES ,BEE colonies ,BIG data ,BEES ,ARTIFICIAL intelligence ,DATA replication - Abstract
The Internet of Things (IoT) consists of complex and dynamically aggregated elements or smart entities that need decentralized supervision for data exchanging throughout different networks. The artificial bee colony (ABC) is utilized in optimization problems for the big data in IoT, cloud and central repositories. The main limitation during the searching mechanism is that every single food site is compared with every other food site to find the best solution in the neighboring regions. In this way, an extensive number of redundant comparisons are required, which results in a slower convergence rate, greater time consumption and increased delays. This paper presents a solution to optimize search operations with an enhanced ABC (E-ABC) approach. The proposed algorithm compares the best food sites with neighboring sites to exclude poor sources. It achieves an efficient mechanism, where the number of redundant comparisons is decreased during the searching mechanism of the employed bee phase and the onlooker bee phase. The proposed algorithm is implemented in a replication scenario to validate its performance in terms of the mean objective function values for different functions, as well as the probability of availability and the response time. The results prove the superiority of the E-ABC in contrast to its counterparts. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Challenges and opportunities for Arabic question-answering systems: current techniques and future directions.
- Author
-
Alrayzah, Asmaa, Alsolami, Fawaz, and Saleh, Mostafa
- Subjects
QUESTION answering systems ,NATURAL language processing ,ARTIFICIAL intelligence ,MORPHOLOGY (Grammar) ,ARABIC language ,NATURAL languages - Abstract
Artificial intelligence-based question-answering (QA) systems can expedite the performance of various tasks. These systems either read passages and answer questions given in natural languages or if a question is given, they extract the most accurate answer from documents retrieved from the internet. Arabic is spoken by Arabs and Muslims and is located in the middle of the Arab world, which encompasses the Middle East and North Africa. It is difficult to use natural language processing techniques to process modern Arabic owing to the language's complex morphology, orthographic ambiguity, regional variations in spoken Arabic, and limited linguistic and technological resources. Only a few Arabic QA experiments and systems have been designed on small datasets, some of which are yet to be made available. Although several reviews of Arabic QA studies have been conducted, the number of studies covered has been limited and recent trends have not been included. To the best of our knowledge, only two systematic reviews focused on Arabic QA have been published to date. One covered only 26 primary studies without considering recent techniques, while the other covered only nine studies conducted for Holy Qur'an QA systems. Here, the included studies were analyzed in terms of the datasets used, domains covered, types of Arabic questions asked, information retrieved, the mechanism used to extract answers, and the techniques used. Based on the results of the analysis, several limitations, concerns, and recommendations for future research were identified. Additionally, a novel taxonomy was developed to categorize the techniques used based on the domains and approaches of the QA system. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
10. A Double-Layer Indemnity Enhancement Using LSTM and HASH Function Technique for Intrusion Detection System.
- Author
-
Ali, Abdullah Marish, Alqurashi, Fahad, Alsolami, Fawaz Jaber, and Qaiyum, Sana
- Subjects
COMPUTER network traffic ,INTRUSION detection systems (Computer security) ,COMPUTER network security ,DATABASES ,TRACKING algorithms ,INDEMNITY - Abstract
The Intrusion Detection System (IDS) is the most widely used network security mechanism for distinguishing between normal and malicious traffic network activities. It aids network security in that it may identify unforeseen hazards in network traffic. Several techniques have been put forth by different researchers for network intrusion detection. However, because network attacks have increased dramatically, making it difficult to execute precise detection rates quickly, the demand for effectively recognizing network incursion is growing. This research proposed an improved solution that uses Long Short-Term Memory (LSTM) and hash functions to construct a revolutionary double-layer security solution for IoT Network Intrusion Detection. The presented framework utilizes standard and well-known real-time IDS datasets such as KDDCUP99 and UNSWNB-15. In the presented framework, the dataset was pre-processed, and it employed the Shuffle Shepherd Optimization (SSO) algorithm for tracking the most informative attributes from the filtered database. Further, the designed model used the LSTM algorithm for classifying the normal and malicious network traffic precisely. Finally, a secure hash function SHA3-256 was utilized for countering the attacks. The intensive experimental assessment of the presented approach with the conventional algorithms emphasized the efficiency of the proposed framework in terms of accuracy, precision, recall, etc. The analysis showed that the presented model attained attack prediction accuracy of 99.92% and 99.91% for KDDCUP99 and UNSWNB-15, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
11. Deep Reinforcement Learning for Workload Prediction in Federated Cloud Environments.
- Author
-
Ahamed, Zaakki, Khemakhem, Maher, Eassa, Fathy, Alsolami, Fawaz, Basuhail, Abdullah, and Jambi, Kamal
- Subjects
DEEP reinforcement learning ,VIRTUAL machine systems ,REINFORCEMENT learning ,SERVICE level agreements ,DEEP learning ,ENERGY consumption - Abstract
The Federated Cloud Computing (FCC) paradigm provides scalability advantages to Cloud Service Providers (CSP) in preserving their Service Level Agreement (SLA) as opposed to single Data Centers (DC). However, existing research has primarily focused on Virtual Machine (VM) placement, with less emphasis on energy efficiency and SLA adherence. In this paper, we propose a novel solution, Federated Cloud Workload Prediction with Deep Q-Learning (FEDQWP). Our solution addresses the complex VM placement problem, energy efficiency, and SLA preservation, making it comprehensive and beneficial for CSPs. By leveraging the capabilities of deep learning, our FEDQWP model extracts underlying patterns and optimizes resource allocation. Real-world workloads are extensively evaluated to demonstrate the efficacy of our approach compared to existing solutions. The results show that our DQL model outperforms other algorithms in terms of CPU utilization, migration time, finished tasks, energy consumption, and SLA violations. Specifically, our QLearning model achieves efficient CPU utilization with a median value of 29.02, completes migrations in an average of 0.31 units, finishes an average of 699 tasks, consumes the least energy with an average of 1.85 kWh, and exhibits the lowest number of SLA violations with an average of 0.03 violations proportionally. These quantitative results highlight the superiority of our proposed method in optimizing performance in FCC environments. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
12. Optimization of Approximate Inhibitory Rules Relative to Number of Misclassifications
- Author
-
Alsolami, Fawaz, Chikalov, Igor, Moshkov, Mikhail, and Zielosko, Beata
- Published
- 2013
- Full Text
- View/download PDF
13. Web-Informed-Augmented Fake News Detection Model Using Stacked Layers of Convolutional Neural Network and Deep Autoencoder.
- Author
-
Ali, Abdullah Marish, Ghaleb, Fuad A., Mohammed, Mohammed Sultan, Alsolami, Fawaz Jaber, and Khan, Asif Irshad
- Subjects
CONVOLUTIONAL neural networks ,FAKE news ,DEEP learning ,COMMUNITIES ,ATTRIBUTION of news - Abstract
Today, fake news is a growing concern due to its devastating impacts on communities. The rise of social media, which many users consider the main source of news, has exacerbated this issue because individuals can easily disseminate fake news more quickly and inexpensive with fewer checks and filters than traditional news media. Numerous approaches have been explored to automate the detection and prevent the spread of fake news. However, achieving accurate detection requires addressing two crucial aspects: obtaining the representative features of effective news and designing an appropriate model. Most of the existing solutions rely solely on content-based features that are insufficient and overlapping. Moreover, most of the models used for classification are constructed with the concept of a dense features vector unsuitable for short news sentences. To address this problem, this study proposed a Web-Informed-Augmented Fake News Detection Model using Stacked Layers of Convolutional Neural Network and Deep Autoencoder called ICNN-AEN-DM. The augmented information is gathered from web searches from trusted sources to either support or reject the claims in the news content. Then staked layers of CNN with a deep autoencoder were constructed to train a probabilistic deep learning-base classifier. The probabilistic outputs of the stacked layers were used to train decision-making by staking multilayer perceptron (MLP) layers to the probabilistic deep learning layers. The results based on extensive experiments challenging datasets show that the proposed model performs better than the related work models. It achieves 26.6% and 8% improvement in detection accuracy and overall detection performance, respectively. Such achievements are promising for reducing the negative impacts of fake news on communities. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
14. Managing Security of Healthcare Data for a Modern Healthcare System.
- Author
-
Almalawi, Abdulmohsen, Khan, Asif Irshad, Alsolami, Fawaz, Abushark, Yoosef B., and Alfakeeh, Ahmed S.
- Subjects
DATA security ,METAHEURISTIC algorithms ,ARTIFICIAL intelligence ,DATA protection ,INTERNET of things ,DATA privacy - Abstract
The advent of Artificial Intelligence (AI) and the Internet of Things (IoT) have recently created previously unimaginable opportunities for boosting clinical and patient services, reducing costs and improving community health. Yet, a fundamental challenge that the modern healthcare management system faces is storing and securely transferring data. Therefore, this research proposes a novel Lionized remora optimization-based serpent (LRO-S) encryption method to encrypt sensitive data and reduce privacy breaches and cyber-attacks from unauthorized users and hackers. The LRO-S method is the combination of hybrid metaheuristic optimization and improved security algorithm. The fitness functions of lion and remora are combined to create a new algorithm for security key generation, which is provided to the serpent encryption algorithm. The LRO-S technique encrypts sensitive patient data before storing it in the cloud. The primary goal of this study is to improve the safety and adaptability of medical professionals' access to cloud-based patient-sensitive data more securely. The experiment's findings suggest that the secret keys generated are sufficiently random and one of a kind to provide adequate protection for the data stored in modern healthcare management systems. The proposed method minimizes the time needed to encrypt and decrypt data and improves privacy standards. This study found that the suggested technique outperformed previous techniques in terms of reducing execution time and is cost-effective. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
15. Technical Study of Deep Learning in Cloud Computing for Accurate Workload Prediction.
- Author
-
Ahamed, Zaakki, Khemakhem, Maher, Eassa, Fathy, Alsolami, Fawaz, and Al-Ghamdi, Abdullah S. Al-Malaise
- Subjects
RECURRENT neural networks ,CONVOLUTIONAL neural networks ,STANDARD deviations ,CLOUD computing ,SERVICE level agreements ,DEEP learning - Abstract
Proactive resource management in Cloud Services not only maximizes cost effectiveness but also enables issues such as Service Level Agreement (SLA) violations and the provisioning of resources to be overcome. Workload prediction using Deep Learning (DL) is a popular method of inferring complicated multidimensional data of cloud environments to meet this requirement. The overall quality of the model depends on the quality of the data as much as the architecture. Therefore, the data sourced to train the model must be of good quality. However, existing works in this domain have either used a singular data source or have not taken into account the importance of uniformity for unbiased and accurate analysis. This results in the efficacy of DL models suffering. In this paper, we provide a technical analysis of using DL models such as Recurrent Neural Networks (RNN), Multilayer Perception (MLP), Long Short-Term Memory (LSTM), and, Convolutional Neural Networks (CNN) to exploit the time series characteristics of real-world workloads from the Parallel Workloads Archive of the Standard Workload Format (SWF) with the aim of conducting an unbiased analysis. The robustness of these models is evaluated using the Mean Absolute Error (MAE) and Root Mean Squared Error (RMSE) error metrics. The findings of these highlight that the LSTM model exhibits the best performance compared to the other models. Additionally, to the best of our knowledge, insights of DL in workload prediction of cloud computing environments is insufficient in the literature. To address these challenges, we provide a comprehensive background on resource management and load prediction using DL. Then, we break down the models, error metrics, and data sources across different bodies of work. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
16. Dynamic Extraction of Initial Behavior for Evasive Malware Detection.
- Author
-
Aboaoja, Faitouri A., Zainal, Anazida, Ali, Abdullah Marish, Ghaleb, Fuad A., Alsolami, Fawaz Jaber, and Rassam, Murad A.
- Subjects
MACHINE learning ,MALWARE ,FEATURE extraction - Abstract
Recently, malware has become more abundant and complex as the Internet has become more widely used in daily services. Achieving satisfactory accuracy in malware detection is a challenging task since malicious software exhibit non-relevant features when they change the performed behaviors as a result of their awareness of the analysis environments. However, the existing solutions extract features from the entire collected data offered by malware during the run time. Accordingly, the actual malicious behaviors are hidden during the training, leading to a model trained using unrepresentative features. To this end, this study presents a feature extraction scheme based on the proposed dynamic initial evasion behaviors determination (DIEBD) technique to improve the performance of evasive malware detection. To effectively represent evasion behaviors, the collected behaviors are tracked by examining the entropy distributions of APIs-gram features using the box-whisker plot algorithm. A feature set suggested by the DIEBD-based feature extraction scheme is used to train machine learning algorithms to evaluate the proposed scheme. Our experiments' outcomes on a dataset of benign and evasive malware samples show that the proposed scheme achieved an accuracy of 0.967, false positive rate of 0.040, and F1 of 0.975. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
17. A Unified Decision-Making Technique for Analysing Treatments in Pandemic Context.
- Author
-
Alsolami, Fawaz, Al-Malaise Alghamdi, Abdullah Saad, Khan, Asif Irshad, Abushark, Yoosef B., Almalawi, Abdulmohsen, Saleem, Farrukh, Agrawal, Alka, Kumar, Rajeev, and Khan, Raees Ahmad
- Subjects
PANDEMICS ,MULTIPLE criteria decision making ,CONVALESCENT plasma ,COVID-19 ,THERAPEUTICS ,COVID-19 treatment - Abstract
The COVID-19 pandemic has triggered a global humanitarian disaster that has never been seen before. Medical experts, on the other hand, are undecided on the most valuable treatments of therapy because people ill with this infection exhibit a wide range of illness indications at different phases of infection. Further, this project aims to undertake an experimental investigation to determine which treatments for COVID-19 disease is the most effective and preferable. The research analysis is based on vast data gathered from professionals and research journals, making this study a comprehensive reference. To solve this challenging task, the researchers used the HF AHPTOPSIS Methodology, which is a well-known and highly effective MultiCriteria Decision Making (MCDM) technique. The technique assesses the many treatment options identified through various research papers and guidelines proposed by various countries, based on the recommendations of medical practitioners and professionals. The review process begins with a ranking of different treatments based on their effectiveness using the HF-AHP approach and then evaluates the results in five different hospitals chosen by the authors as alternatives. We also perform robustness analysis to validate the conclusions of our analysis. As a result, we obtained highly corroborative results that can be used as a reference. The results suggest that convalescent plasma has the greatest rank and priority in terms of effectiveness and demand, implying that convalescent plasma is the most effective treatment for SARS-CoV-2 in our opinion. Peepli also has the lowest priority in the estimation. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
18. Analysis of the Exploration of Security and Privacy for Healthcare Management Using Artificial Intelligence: Saudi Hospitals.
- Author
-
Almalawi, Abdulmohsen, Khan, Asif Irshad, Alsolami, Fawaz, Abushark, Yoosef B., Alfakeeh, Ahmed S., and Mekuriyaw, Walelign Dinku
- Subjects
ARTIFICIAL intelligence ,MANAGEMENT information systems ,HEALTH information systems ,INFORMATION resources management ,HOSPITALS ,MOBILE apps ,CAPABILITY maturity model - Abstract
A large component of the Health Information Systems now comprises numerous independent apps created in the past that need to be merged to provide a more uniform service. In addition to affecting the Intelligent Health Board Functionality and dependability, the quality of these additional apps may also have an impact. A critical characteristic of the SHS's management and upkeep is the SHS's reliance on the real benefits provided to it. In speaking, an HMIS (Healthcare Management Information System) is a computer-based device that benefits medical practitioners to perform their duties more efficiently by coordinating all of their data. Even though these systems are widely used by most of the world, there is a significant need to comprehend these technologies and indeed the potential they provide. Healthcare data warehouses in Saudi Arabia have evolved through time, and this research examines how key service improvements in Saudi present varied viewpoints on how premium initiative help may be attained in health as well as how this could be done. When it comes to understanding how different types of medical professionals interact with healthcare systems throughout history, researchers developed stages of the maturity model. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
19. Deep Ensemble Fake News Detection Model Using Sequential Deep Learning Technique.
- Author
-
Ali, Abdullah Marish, Ghaleb, Fuad A., Al-Rimy, Bander Ali Saleh, Alsolami, Fawaz Jaber, and Khan, Asif Irshad
- Subjects
DEEP learning ,SEQUENTIAL learning ,FAKE news ,NATURAL language processing ,FEATURE extraction ,CONVOLUTIONAL neural networks - Abstract
Recently, fake news has been widely spread through the Internet due to the increased use of social media for communication. Fake news has become a significant concern due to its harmful impact on individual attitudes and the community's behavior. Researchers and social media service providers have commonly utilized artificial intelligence techniques in the recent few years to rein in fake news propagation. However, fake news detection is challenging due to the use of political language and the high linguistic similarities between real and fake news. In addition, most news sentences are short, therefore finding valuable representative features that machine learning classifiers can use to distinguish between fake and authentic news is difficult because both false and legitimate news have comparable language traits. Existing fake news solutions suffer from low detection performance due to improper representation and model design. This study aims at improving the detection accuracy by proposing a deep ensemble fake news detection model using the sequential deep learning technique. The proposed model was constructed in three phases. In the first phase, features were extracted from news contents, preprocessed using natural language processing techniques, enriched using n-gram, and represented using the term frequency–inverse term frequency technique. In the second phase, an ensemble model based on deep learning was constructed as follows. Multiple binary classifiers were trained using sequential deep learning networks to extract the representative hidden features that could accurately classify news types. In the third phase, a multi-class classifier was constructed based on multilayer perceptron (MLP) and trained using the features extracted from the aggregated outputs of the deep learning-based binary classifiers for final classification. The two popular and well-known datasets (LIAR and ISOT) were used with different classifiers to benchmark the proposed model. Compared with the state-of-the-art models, which use deep contextualized representation with convolutional neural network (CNN), the proposed model shows significant improvements (2.41%) in the overall performance in terms of the F1score for the LIAR dataset, which is more challenging than other datasets. Meanwhile, the proposed model achieves 100% accuracy with ISOT. The study demonstrates that traditional features extracted from news content with proper model design outperform the existing models that were constructed based on text embedding techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
20. Cyber Security Analysis and Evaluation for Intrusion Detection Systems.
- Author
-
Abushark, Yoosef B., Khan, Asif Irshad, Alsolami, Fawaz, Almalawi, Abdulmohsen, Alam, Md Mottahir, Agrawal, Alka, Kumar, Rajeev, and Khan, Raees Ahmad
- Subjects
INTRUSION detection systems (Computer security) ,ANALYTIC hierarchy process ,INTERNET security ,DATA security failures ,MULTIPLE criteria decision making ,SECURITY systems - Abstract
Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world. Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security issues. It is crucial in offering a proactive security system in the field of cybersecurity. In real time, cybersecurity protects information, information systems, and networks from intruders. In the recent decade, several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity breaches. At an increasing rate, intruders are breaching information security. Anomaly detection, software vulnerability diagnosis, phishing page identification, denial of service assaults, and malware identification are the foremost cyber-security concerns that require efficient clarifications. Practitioners have tried a variety of approaches to address the present cybersecurity obstacles and concerns. In a similar vein, the goal of this research is to assess the idealness of machine learning-based intrusion detection systems under fuzzy conditions using a Multi-Criteria Decision Making (MCDM)-based Analytical Hierarchy Process (AHP) and a Technique for Order of Preference by Similarity to Ideal-Solutions (TOPSIS). Fuzzy sets are ideal for dealing with decision-making scenarios in which experts are unsure of the best course of action. The projected work would support practitioners in identifying, prioritising, and selecting cybersecurity-related attributes for intrusion detection systems, allowing them to design more optimal and effective intrusion detection systems. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
21. Sustainable-Security Assessment Through a Multi Perspective Benchmarking Framework.
- Author
-
Alfakeeh, Ahmed Saeed, Almalawi, Abdulmohsen, Alsolami, Fawaz Jaber, Abushark, Yoosef B., Khan, Asif Irshad, Bahaddad, Adel Aboud S., Alam, Mottahir, Agrawal, Alka, Kumar, Rajeev, and Khan, Raees Ahmad
- Subjects
ANALYTIC network process ,TOPSIS method ,COMPUTER software development ,DESIGN software - Abstract
The current cyber-attack environment has put even the most protected systems at risk as the hackers are now modifying technologies to exploit even the tiniest of weaknesses and infiltrate networks. In this situation, it's critical to design and construct software that is both secure and long-lasting. While security is the most well-defined aspect of health information software systems, it is equally significant to prioritise sustainability because any health information software system will be more effective if it provides both security and sustainability to the customers at the same time. In this league, it is crucial to determine those characteristics in the systems that can help in the accurate assessment of the sustainable-security of the health information software during the development stage. This research work employed the Fuzzy Analytic Network Process (Fuzzy ANP) to estimate the impact of the overall sustainable-security of health information software systems and their characteristics in order to achieve a high level of sustainable-security. Furthermore, the study validates the efficacy of the Fuzzy ANP procedure by testing it on five different versions of a health information software system through Fuzzy Technique for Order of Preference by Similarity to Ideal Solutions (Fuzzy TOPSIS). Despite the sensitivity of the health information software systems, this study employed multiple versions of health information software system. When compared with the existing procedures for testing the sustainable-security of health information software systems, the outcomes were conclusive and significantly more effective. Besides saving time and resources, the mechanism suggested in this research work aims to establish an outline that software practitioners can follow to enhance the sustainable-security of health information software systems. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
22. Privacy-Preserving and Efficient Data Collection Scheme for AMI Networks Using Deep Learning
- Author
-
Ibrahem, Mohamed I., Mahmoud, Mohamed, Fouda, Mostafa M., Alsolami, Fawaz, Alasmary, Waleed, Xuemin, and Shen
- Subjects
FOS: Computer and information sciences ,Computer Science - Cryptography and Security ,Cryptography and Security (cs.CR) - Abstract
In advanced metering infrastructure (AMI), smart meters (SMs), which are installed at the consumer side, send fine-grained power consumption readings periodically to the electricity utility for load monitoring and energy management. Change and transmit (CAT) is an efficient approach to collect these readings, where the readings are not transmitted when there is no enough change in consumption. However, this approach causes a privacy problem that is by analyzing the transmission pattern of an SM, sensitive information on the house dwellers can be inferred. For instance, since the transmission pattern is distinguishable when dwellers are on travel, attackers may analyze the pattern to launch a presence-privacy attack (PPA) to infer whether the dwellers are absent from home. In this paper, we propose a scheme, called "STDL", for efficient collection of power consumption readings in AMI networks while preserving the consumers' privacy by sending spoofing transmissions (redundant real readings) using a deep-learning approach. We first use a clustering technique and real power consumption readings to create a dataset for transmission patterns using the CAT approach. Then, we train an attacker model using deep-learning, and our evaluations indicate that the success rate of the attacker is about 91%. Finally, we train a deep-learning-based defense model to send spoofing transmissions efficiently to thwart the PPA. Extensive evaluations are conducted, and the results indicate that our scheme can reduce the attacker's success rate, to 13.52% in case he knows the defense model and to 3.15% in case he does not know the model, while still achieving high efficiency in terms of the number of readings that should be transmitted. Our measurements indicate that the proposed scheme can reduce the number of readings that should be transmitted by about 41% compared to continuously transmitting readings., 16 pages, 11 figures
- Published
- 2020
23. Computational Approach for Detection of Diabetes from Ocular Scans.
- Author
-
Khan, Asif Irshad, Kshirsagar, Pravin R., Manoharan, Hariprasath, Alsolami, Fawaz, Almalawi, Abdulmohsen, Abushark, Yoosef B., Alam, Mottahir, and Chamato, Fekadu Ashine
- Subjects
DEEP learning ,MACHINE learning ,DIABETES ,DIABETIC retinopathy ,EYE examination ,RETINAL imaging - Abstract
The estimated 30 million children and adults are suffering with diabetes across the world. A person with diabetes can recognize several symptoms, and it can also be tested using retina image as diabetes also affects the human eye. The doctor is usually able to detect retinal changes quickly and can help prevent vision loss. Therefore, regular eye examinations are very important. Diabetes is a chronic disease that affects various parts of the human body including the retina. It can also be considered as major cause for blindness in developed countries. This paper deals with classification of retinal image into diabetes or not with the help of deep learning algorithms and architecture. Hence, deep learning is beneficial for classification of medical images specifically such a complex image of human retina. A large number of image data are considered throughout the project on which classification is performed by using binary classifier. On applying certain deep learning algorithms, model results into the training accuracy of 96.68% and validation accuracy of 66.82%. Diabetic retinopathy can be considered as an effective and efficient method for diabetes detection. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
24. Integrating Blockchain Technology into Healthcare Through an Intelligent Computing Technique.
- Author
-
Khan, Asif Irshad, ALGhamdi, Abdullah Saad Al-Malaise, Alsolami, Fawaz Jaber, Abushark, Yoosef B., Almalawi, Abdulmohsen, Ali, Abdullah Marish, Agrawal, Alka, Kumar, Rajeev, and Khan, Raees Ahmad
- Subjects
BLOCKCHAINS ,MEDICAL care ,INFORMATION technology ,DATA security ,SECURITY management - Abstract
The blockchain technology plays a significant role in the present era of information technology. In the last few years, this technology has been used effectively in several domains. It has already made significant differences in human life, as well as is intended to have noticeable impact in many other domains in the forthcoming years. The rapid growth in blockchain technology has created numerous new possibilities for use, especially for healthcare applications. The digital healthcare services require highly effective security methodologies that can integrate data security with the availablemanagement strategies. To test and understand this goal of security management in Saudi Arabian perspective, the authors performed a numerical analysis and simulation through a multi criteria decision making approach in this study. The authors adopted the fuzzy Analytical Hierarchy Process (AHP) for evaluating the effectiveness and then applied the fuzzy Technique forOrder of Preference by Similarity to Ideal Solution (TOPSIS) technique to simulate the validation of results. For eliciting highly corroborative and conclusive results, the study referred to a real time project of diabetes patients' management application of Kingdom of Saudi Arabia (KSA). The results discussed in this paper are scientifically proven and validated through various analysis approaches. Hence the present study can be a credible basis for other similar endeavours being undertaken in the domain of blockchain research. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
25. Hesitant Fuzzy-Sets Based Decision-Making Model for Security Risk Assessment.
- Author
-
Alfakeeh, Ahmed S., Almalawi, Abdulmohsen, Alsolami, Fawaz Jaber, Abushark, Yoosef B., Khan, Asif Irshad, Bahaddad, Adel Aboud S., Agrawal, Alka, Kumar, Rajeev, and Khan, Raees Ahmad
- Subjects
FUZZY sets ,DECISION making ,RISK assessment ,WEB-based user interfaces ,MEDICAL care - Abstract
Security is an important component in the process of developing healthcare web applications. We need to ensure security maintenance; therefore the analysis of healthcare web application's security risk is of utmost importance. Properties must be considered to minimise the security risk. Additionally, security risk management activities are revised, prepared, implemented, tracked, and regularly set up efficiently to design the security of healthcare web applications. Managing the security risk of a healthcare web application must be considered as the key component. Security is, in specific, seen as an add-on during the development process of healthcare web applications, but not as the key problem. Researchers must ensure that security is taken into account right from the earlier developmental stages of the healthcare web application. In this row, the authors of this study have used the hesitant fuzzy-based AHP-TOPSIS technique to estimate the risks of various healthcare web applications for improving security-durability. This approach would help to design and incorporate security features in healthcare web applications that would be able to battle threats on their own, and not depend solely on the external security of healthcare web applications. Furthermore, in terms of healthcare web application's security-durability, the security risk variable is measured, and vice versa. Hence, the findings of our study will also be useful in improving the durability of several web applications in healthcare. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
26. Early MCI-to-AD Conversion Prediction Using Future Value Forecasting of Multimodal Features.
- Author
-
Minhas, Sidra, Khanum, Aasia, Alvi, Atif, Riaz, Farhan, Khan, Shoab A., Alsolami, Fawaz, and A Khan, Muazzam
- Subjects
MILD cognitive impairment ,ALZHEIMER'S patients ,SUPPORT vector machines ,ALZHEIMER'S disease - Abstract
In Alzheimer's disease (AD) progression, it is imperative to identify the subjects with mild cognitive impairment before clinical symptoms of AD appear. This work proposes a technique for decision support in identifying subjects who will show transition from mild cognitive impairment (MCI) to Alzheimer's disease (AD) in the future. We used robust predictors from multivariate MRI-derived biomarkers and neuropsychological measures and tracked their longitudinal trajectories to predict signs of AD in the MCI population. Assuming piecewise linear progression of the disease, we designed a novel weighted gradient offset-based technique to forecast the future marker value using readings from at least two previous follow-up visits. Later, the complete predictor trajectories are used as features for a standard support vector machine classifier to identify MCI-to-AD progressors amongst the MCI patients enrolled in the Alzheimer's disease neuroimaging initiative (ADNI) cohort. We explored the performance of both unimodal and multimodal models in a 5-fold cross-validation setup. The proposed technique resulted in a high classification AUC of 91.2% and 95.7% for 6-month- and 1-year-ahead AD prediction, respectively, using multimodal markers. In the end, we discuss the efficacy of MRI markers as compared to NM for MCI-to-AD conversion prediction. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
27. Impact Assessment of COVID-19 Pandemic Through Machine Learning Models.
- Author
-
Alsolami, Fawaz Jaber, ALGhamdi, Abdullah Saad Al-Malaise, Khan, Asif Irshad, Abushark, Yoosef B., Almalawi, Abdulmohsen, Saleem, Farrukh, Agrawal, Alka, Kumar, Rajeev, and Khan, Raees Ahmad
- Subjects
COVID-19 pandemic ,MACHINE learning ,COVID-19 ,STAY-at-home orders ,PANDEMICS ,SOCIAL history - Abstract
Ever since its outbreak in the Wuhan city of China, COVID-19 pandemic has engulfed more than 211 countries in the world, leaving a trail of unprecedented fatalities. Even more debilitating than the infection itself, were the restrictions like lockdowns and quarantine measures taken to contain the spread of Coronavirus. Such enforced alienation affected both the mental and social condition of people significantly. Social interactions and congregations are not only integral part of work life but also formthe basis of human evolvement. However, COVID-19 brought all such communication to a grinding halt. Digital interactions have failed to enthuse the fervor that one enjoys in face-to-face meets. The pandemic has shoved the entire planet into an unstable state. The main focus and aim of the proposed study is to assess the impact of the pandemic on different aspects of the society in Saudi Arabia. To achieve this objective, the study analyzes two perspectives: the early approach, and the late approach of COVID-19 and the consequent effects on different aspects of the society. We used a Machine Learning based framework for the prediction of the impact of COVID-19 on the key aspects of society. Findings of this research study indicate that financial resources were the worst affected. Several countries are facing economic upheavals due to the pandemic and COVID-19 has had a considerable impact on the lives as well as the livelihoods of people. Yet the damage is not irretrievable and the world's societies can emerge out of this setback through concerted efforts in all facets of life. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
28. Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective.
- Author
-
Abushark, Yoosef B., Khan, Asif Irshad, Alsolami, Fawaz Jaber, Almalawi, Abdulmohsen, Alam, Md Mottahir, Agrawal, Alka, Kumar, Rajeev, and Khan, Raees Ahmad
- Subjects
REQUIREMENTS engineering ,USER-centered system design ,COMPUTER software development ,SOFTWARE architecture ,QUALITY function deployment ,SOFTWARE engineering - Abstract
Most of the security strategies today are primarily designed to provide security protection, rather than to solve one of the basic security issues related to adequate software product architecture. Several models, frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle. Therefore it is important to assess the usability of the popular security requirements engineering (SRE) approaches.Asignificant factor in themanagement and handling of successful security requirements is the assessment of security requirements engineering method performance. This assessment will allow changes to the engineering process of security requirements. The consistency of security requirements depends heavily on the usability of security requirements engineering. Several SRE approaches are available for use and each approach takes into account several factors of usability but does not cover every element of usability. There seems to be no realistic implementation of such models because the concept of usability is not specific. This paper aims at specifying the different taxonomy of usability and design hierarchical usability model. The taxonomy takes into account the common quality assessment parameters that combine variables, attributes, and characteristics identified in different approaches used for security requirements engineering. The multiple-criteria decision-making (MCDM) model used in this paper for usability evaluation is called the fuzzy AHP-TOPSIS model which can conveniently be incorporated into the current approach of software engineering. Five significant usability criteria are identified and used to evaluate the six different alternatives. Such strategies are graded as per their expected values of usability. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
29. An Architecture for Translating Sequential Code to Parallel.
- Author
-
Alsubhi, Khalid, Alsolami, Fawaz, Algarni, Abdullah, Jambi, Kamal, Eassa, Fathy, and Khemakhem, Maher
- Published
- 2018
- Full Text
- View/download PDF
30. Comparison of Heuristics for Optimization of Association Rules.
- Author
-
Alsolami, Fawaz, Amin, Talha, Moshkov, Mikhail, Zielosko, Beata, and Żabiński, Krzysztof
- Subjects
- *
DYNAMIC programming , *HEURISTIC , *RULES , *ROUGH sets - Abstract
In this paper, seven greedy heuristics for construction of association rules are compared from the point of view of the length and coverage of constructed rules. The obtained rules are compared also with optimal ones constructed by dynamic programming algorithms. The average relative difference between length of rules constructed by the best heuristic and minimum length of rules is at most 4%. The same situation is with coverage. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
31. Optimization of inhibitory decision rules relative to length
- Author
-
Alsolami, Fawaz, Chikalov, Igor, Moshkov, Mikhail, and Zielosko, Beata
- Subjects
inhibitory decision rules ,length ,dynamic programming algorithm - Abstract
The paper is devoted to the study of an algorithm for optimization of inhibitory rules relative to the length. Such rules on the right-hand side have a relation "attribute ≠ value". The considered algorithm is based on an extension of dynamic programming. After the procedure of optimization relative to length, we obtain a graph Λ(T) which describes all nonredundant inhibitory rules with minimum length., Studia Informatica, Vol 33, No 2A (2012)
- Published
- 2012
- Full Text
- View/download PDF
32. Dynamic Programming Approach for Construction of Association Rule Systems.
- Author
-
Alsolami, Fawaz, Amin, Talha, Chikalov, Igor, Moshkov, Mikhail, and Zielosko, Beata
- Subjects
- *
DYNAMIC programming , *ASSOCIATION rule mining , *CARDINAL numbers , *INFORMATION storage & retrieval systems , *MATHEMATICAL optimization - Abstract
In the paper, an application of dynamic programming approach for optimization of association rules from the point of view of knowledge representation is considered. The association rule set is optimized in two stages, first for minimum cardinality and then for minimum length of rules. Experimental results present cardinality of the set of association rules constructed for information system and lower bound on minimum possible cardinality of rule set based on the information obtained during algorithm work as well as obtained results for length. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
33. Decision Rule Classifiers for Multi-label Decision Tables.
- Author
-
Alsolami, Fawaz, Azad, Mohammad, Chikalov, Igor, and Moshkov, Mikhail
- Published
- 2014
- Full Text
- View/download PDF
34. Sequential Optimization of Approximate Inhibitory Rules Relative to the Length, Coverage and Number of Misclassifications.
- Author
-
Alsolami, Fawaz, Chikalov, Igor, and Moshkov, Mikhail
- Published
- 2013
- Full Text
- View/download PDF
35. Length and Coverage of Inhibitory Decision Rules.
- Author
-
Alsolami, Fawaz, Chikalov, Igor, Moshkov, Mikhail, and Zielosko, Beata Marta
- Published
- 2012
- Full Text
- View/download PDF
36. Optimization of Inhibitory Decision Rules Relative to Length and Coverage.
- Author
-
Alsolami, Fawaz, Chikalov, Igor, Moshkov, Mikhail, and Zielosko, Beata
- Published
- 2012
- Full Text
- View/download PDF
37. Comparison of Heuristics for Inhibitory Rule Optimization.
- Author
-
Alsolami, Fawaz, Chikalov, Igor, and Moshkov, Mikhail
- Subjects
MATHEMATICAL optimization ,HEURISTIC algorithms ,KNOWLEDGE representation (Information theory) ,COMPARATIVE studies ,FEATURE extraction ,GREEDY algorithms - Abstract
Knowledge representation and extraction are very important tasks in data mining. In this work, we proposed a variety of rule-based greedy algorithms that able to obtain knowledge contained in a given dataset as a series of inhibitory rules containing an expression “attribute ≠ value” on the right-hand side. The main goal of this paper is to determine based on rule characteristics, rule length and coverage, whether the proposed rule heuristics are statistically significantly different or not; if so, we aim to identify the best performing rule heuristics for minimization of rule length and maximization of rule coverage. Friedman test with Nemenyi post-hoc are used to compare the greedy algorithms statistically against each other for length and coverage. The experiments are carried out on real datasets from UCI Machine Learning Repository. For leading heuristics, the constructed rules are compared with optimal ones obtained based on dynamic programming approach. The results seem to be promising for the best heuristics: the average relative difference between length (coverage) of constructed and optimal rules is at most 2.27% (7%, respectively). Furthermore, the quality of classifiers based on sets of inhibitory rules constructed by the considered heuristics are compared against each other, and the results show that the three best heuristics from the point of view classification accuracy coincides with the three well-performed heuristics from the point of view of rule length minimization. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
38. An IoT based system for magnify air pollution monitoring and prognosis using hybrid artificial intelligence technique.
- Author
-
Almalawi, Abdulmohsen, Alsolami, Fawaz, Khan, Asif Irshad, Alkhathlan, Ali, Fahad, Adil, Irshad, Kashif, Qaiyum, Sana, and Alfakeeh, Ahmed S.
- Subjects
- *
AIR pollutants , *ARTIFICIAL intelligence , *AIR pollution monitoring , *AIR quality indexes , *STANDARD deviations , *AIR pollution , *POLLUTION , *AIR quality - Abstract
Air pollution is the existence of atmospheric chemicals damaging the health of human beings and other living organisms or damaging the environment or resources. Rarely any common contaminants are smog, nicotine, mold, yeast, biogas, or carbon dioxide. The paper will primarily observe, visualize and anticipate pollution levels. In particular, three algorithms of Artificial Intelligence were used to create good forecasting models and a predictive AQI model for 4 distinct gases: carbon dioxide, sulphur dioxide, nitrogen dioxide, and atmospheric particulate matter. Thus, in this paper, the Air Qualification Index is developed utilizing Linear Regression, Support Vector Regression, and the Gradient Boosted Decision Tree GBDT Ensembles model over the next 5 h and analyzes air qualities using various sensors. The hypothesized artificial intelligence models are evaluated to the Root Mean Squares Error, Mean Squared Error and Mean absolute error, depending upon the performance measurements and a lower error value model is chosen. Based on the algorithm of the Artificial Intelligent System, the level of 5 air pollutants like CO2, SO2, NO2, PM 2.5 and PM10 can be predicted immediately by integrating the observations with errors. It may be used to detect air quality from distance in large cities and can assist lower the degree of environmental pollution. • This research will primarily observe, visualize and anticipate pollution levels. • Air Qualification Index is developed utilizing Linear Regression, Support Vector Regression, and GBDT Ensembles model. • The proposed model is chosen to predict the 5 h air quality index. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
39. TAWSEEM: A Deep-Learning-Based Tool for Estimating the Number of Unknown Contributors in DNA Profiling.
- Author
-
Alotaibi, Hamdah, Alsolami, Fawaz, Abozinadah, Ehab, and Mehmood, Rashid
- Subjects
DEEP learning ,DNA fingerprinting ,FORENSIC sciences ,MISSING persons investigation ,PATERNITY testing ,SOFTWARE development tools - Abstract
DNA profiling involves the analysis of sequences of an individual or mixed DNA profiles to identify the persons that these profiles belong to. A critically important application of DNA profiling is in forensic science to identify criminals by finding a match between their blood samples and the DNA profile found on the crime scene. Other applications include paternity tests, disaster victim identification, missing person investigations, and mapping genetic diseases. A crucial task in DNA profiling is the determination of the number of contributors in a DNA mixture profile, which is challenging due to issues that include allele dropout, stutter, blobs, and noise in DNA profiles; these issues negatively affect the estimation accuracy and the computational complexity. Machine-learning-based methods have been applied for estimating the number of unknowns; however, there is limited work in this area and many more efforts are required to develop robust models and their training on large and diverse datasets. In this paper, we propose and develop a software tool called TAWSEEM that employs a multilayer perceptron (MLP) neural network deep learning model for estimating the number of unknown contributors in DNA mixture profiles using PROVEDIt, the largest publicly available dataset. We investigate the performance of our developed deep learning model using four performance metrics, namely accuracy, F1-score, recall, and precision. The novelty of our tool is evident in the fact that it provides the highest accuracy (97%) compared to any existing work on the most diverse dataset (in terms of the profiles, loci, multiplexes, etc.). We also provide a detailed background on the DNA profiling and literature review, and a detailed account of the deep learning tool development and the performance investigation of the deep learning method. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
40. Connected Objects Geo-Localization Based on SS-RSRP of 5G Networks.
- Author
-
Bannour, Ahmed, Harbaoui, Ahmed, and Alsolami, Fawaz
- Subjects
GLOBAL Positioning System ,COMMUNICATION infrastructure ,ANTENNA design - Abstract
The Global Positioning System (GPS) is not the only way to solve connected objects' geo-localization problems; it is also possible to use the mobile network infrastructure to geo-locate objects connected to the network, using antennas and signals designed for voice and data transfer, such as the 5th generation network. 5G is considered as a least expensive solution because there is no specific equipment to set up. As long as the object is in an area covered by the network, it connects to the nearest 5G Micro-Cell (MC). Through exchange of signals with the MC node we can locate the object. Currently, this location is very fast with less than 5 s but not very precise because it depends on the number of MC antennas of the operator in question and their distance. This paper presents a novel technique to geo-locate connected object in a covered 5G area. We exploit the 5G SS-RSRP used for signal quality measurement, to estimate the distance between two Connected Objects (COs) in move and in a dense urban area. The overall goal is to present a new concept laying on the 5G SS-RSRP signalling. The proposed solution takes into consideration the Deterministic and the Stochastic effect of the received signals which is not treated by the previous works. The accuracy is optimum even after approaching to the distance of one meter which is not reached in previous works too. Our method can also be deployed in the upcoming 5G network since it relies on 5G signals itself. This work and that of Wang are both based on RSRP and give comparable theoretical complexities therefore comparable theoretical execution times as well. However, to obtain a reliable learning Wang requires a huge amount of data which makes it difficult to get a real time aspect of this algorithm. The use of RSRP and the elimination of the learning phase will give more chance to our work to achieve desired performances. Numerical results show the appropriateness of the proposed algorithms and good location accuracy of around one meter. The Cramer Rao Lower Bound derivations shows the robustness of the proposed estimator and consolidate the work. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
41. Mobile Expert System: Exploring Context-Aware Machine Learning Rules for Personalized Decision-Making in Mobile Applications.
- Author
-
Sarker, Iqbal H., Khan, Asif Irshad, Abushark, Yoosef B., and Alsolami, Fawaz
- Subjects
ARTIFICIAL intelligence ,MACHINE learning ,MOBILE apps ,EXPERT systems ,PROBLEM solving ,DECISION making - Abstract
Expert systems, a form of artificial intelligence (AI), are typically designed to solve many real-world problems by reasoning through knowledge, which is primarily represented as IF–THEN rules, with the information acquired from humans or domain experts. However, to assume such rules for personalized decision-making in an intelligent, context-aware mobile application is a challenging issue. The reason is that different mobile users may behave differently in various day-to-day situations, i.e., not identical, and thus the rules for personalized services must be reflected according to their symmetrical or asymmetrical behavioral activities. Therefore, our key focus is to solve this issue through adding personalized decision-making intelligence to develop powerful mobile applications to assist the end-users. To achieve our goal, in this paper, we explore on "Mobile Expert System", where we take into account machine-learning rules as knowledge-base rather than traditional handcrafted static rules. Thus, the concept of a mobile expert system enables the computing and decision-making processes more actionable and intelligent than traditional ones in the domain of mobile analytics and applications. Our experiment section shows that the context-aware machine learning rules discovered from users' mobile phone data can contribute in building a mobile expert system to solve a particular problem, through making personalized decisions in various context-aware test cases. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
42. Cloud Computing Services: Taxonomy of Discovery Approaches and Extraction Solutions.
- Author
-
Mohammed, Fathey, Ali, Abdullah Marish, Al-Ghamdi, Abdullah Saad Al-Malaise, Alsolami, Fawaz, Shamsuddin, Siti Mariyam, and Eassa, Fathy E.
- Subjects
CLOUD computing ,TAXONOMY ,RESEARCH methodology - Abstract
Cloud computing offers new features of sharing resources and applications to meet users' computing requirements. It is a model by which the users can access computing resources as services offered on the Internet (cloud services). Cloud service providers offer a highly diverse range of asymmetric cloud services with heterogeneous features, which makes it difficult for the users to find the best service that fits his needs. Many research studies have been done on cloud service discovery, and several models and solutions that applied different techniques have been proposed. This paper aims at presenting the state of the art in the area of cloud services discovery by exploring the current approaches, techniques, and models. Furthermore, it proposes a taxonomy of cloud service discovery approaches. An integrative review approach was used to explore the related literature. Then, by analyzing the existing cloud service discovery solutions, a taxonomy of discovery approaches was suggested based on several perspectives including the discovery environment and the discovery process methods. The proposed taxonomy allows easily classifying and comparing cloud services discovery solutions. Moreover, it may reveal issues and gaps for further research and expose new insights for more innovative and effective cloud services discovery solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
43. IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model.
- Author
-
Sarker, Iqbal H., Abushark, Yoosef B., Alsolami, Fawaz, and Khan, Asif Irshad
- Subjects
INTRUSION detection systems (Computer security) ,INTERNET security ,MACHINE learning ,K-nearest neighbor classification ,COMPUTER networks ,SUPPORT vector machines ,ARTIFICIAL intelligence ,INTELLIGENT buildings - Abstract
Cyber security has recently received enormous attention in today's security concerns, due to the popularity of the Internet-of-Things (IoT), the tremendous growth of computer networks, and the huge number of relevant applications. Thus, detecting various cyber-attacks or anomalies in a network and building an effective intrusion detection system that performs an essential role in today's security is becoming more important. Artificial intelligence, particularly machine learning techniques, can be used for building such a data-driven intelligent intrusion detection system. In order to achieve this goal, in this paper, we present an Intrusion Detection Tree ("IntruDTree") machine-learning-based security model that first takes into account the ranking of security features according to their importance and then build a tree-based generalized intrusion detection model based on the selected important features. This model is not only effective in terms of prediction accuracy for unseen test cases but also minimizes the computational complexity of the model by reducing the feature dimensions. Finally, the effectiveness of our IntruDTree model was examined by conducting experiments on cybersecurity datasets and computing the precision, recall, fscore, accuracy, and ROC values to evaluate. We also compare the outcome results of IntruDTree model with several traditional popular machine learning methods such as the naive Bayes classifier, logistic regression, support vector machines, and k-nearest neighbor, to analyze the effectiveness of the resulting security model. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
44. Arithmetic optimization algorithm with deep learning enabled airborne particle-bound metals size prediction model.
- Author
-
Almalawi, Abdulmohsen, Khan, Asif Irshad, Alsolami, Fawaz, Alkhathlan, Ali, Fahad, Adil, Irshad, Kashif, Alfakeeh, Ahmed S., and Qaiyum, Sana
- Subjects
- *
DEEP learning , *MATHEMATICAL optimization , *MACHINE learning , *PREDICTION models , *HEAVY metal toxicology , *ARITHMETIC , *HEAVY metals - Abstract
Recently, heavy metal air pollution has received significant interest in computing the total concentration of every toxic metal. Chemical fractionation of possibly toxic substances in airborne particles becomes a vital element. Among the primary and secondary air pollutants, airborne particulate matter (APM) received considerable internet among research communities owing to the adversative impact on human health. Hence, size distribution details of airborne heavy metals are important in assessing the adverse health effects over the globe. Recently, deep learning models have gained significant interest over the mathematical and statistical prediction models. In this view, this paper presents a novel arithmetic optimization algorithm (AOA) with multi-head attention based bidirectional long short-term memory (MABLSTM) model for predicting the size fractionated airborne particle bound metals. The proposed AOA-MABLSTM technique focuses on the forecasting of the size-fractionated airborne particle bound matter. The presented model intends to examine the concentration of PM and distinct sized-fractionated APM. The proposed model establishes MABLSTM based accurate predictive approaches for atmospheric heavy 83 metals is used for determining temporal trend of heavy metal. The proposed model employs AOA based hyperparameter tuning process to optimally tune the hyperparameters included in the MABLSTM method. To demonstrate the improved outcomes of the AOA-MABLSTM approach, a comparison study is performed with recent models. The stimulation results emphasized the betterment of the presented model over the other methods. Aluminum metal had an RMSE of 73.200 for AOA-MABLSTM. On Cu metal, the AOA-MABLSTM approach had an RMSE of 6.747. On Zn metal, the AOA-MABLSTM system lowered the RMSE by 45.250. [Display omitted] • A novel arithmetic optimization algorithm (AOA) with multi-head attention based bidirectional long short-term memory (MABLSTM) method. • The presented model intends to examine the concentration of PM and distinct sized-fractionated APM. • The proposed model establishes MABLSTM based accurate predictive approaches for atmospheric heavy 83 metals. • The proposed model employs AOA based hyperparameter tuning process to tune the hyperparameter included in the MABLSTM model. • To demonstrate the improved outcomes of the AOA-MABLSTM approach, a comparison study is performed with recent models. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
45. Recycling waste classification using emperor penguin optimizer with deep learning model for bioenergy production.
- Author
-
Khan, Asif Irshad, Almalaise Alghamdi, Abdullah S., Abushark, Yoosef B., Alsolami, Fawaz, Almalawi, Abdulmohsen, and Marish Ali, Abdullah
- Subjects
- *
WASTE recycling , *DEEP learning , *RENEWABLE energy sources , *WASTE products , *CONVOLUTIONAL neural networks - Abstract
The growth and implementation of biofuels and bioenergy conversion technologies play an important part in the production of sustainable and renewable energy resources in the upcoming years. Recycling sources from waste could efficiently ease the risk of world source strain. The waste classification was a good resolution for separating the waste from the recycled objects. It is inefficient and expensive to rely solely on manual classification of garbage and recycling sources. Convolutional neural networks (CNNs) have lately been used to classify recyclable waste, and this is the primary way for recycling the waste. This study presents a recycling waste classification using emperor penguin optimizer with deep learning (RWC-EPODL) model for bioenergy production. RWC-EPODL model focuses on recycling waste materials recognition and classification. When it comes to detecting and classifying trash, the RWC-EPODL model uses two stages. At the initial stage, the RWC-EPODL model uses AX-RetinaNet model for the recognition of waste objects. In addition, Bayesian optimization (BO) algorithm is applied as hyperparameter optimizer of the AX-RetinaNet model. Following the EPO algorithm with a stacked auto-encoder (SAE) model, the EPO algorithm is used to fine-tune the parameters of the SAE technique for trash classification. The RWC-EPODL model's experimental validation is examined through a number of studies. The RWC-EPODL approach has a 98.96 percent success rate. The comparative result analysis reported the better performance of the RWC-EPODL model over recent approaches. [Display omitted] • Novel recycling waste classification using emperor penguin optimizer with deep learning (RWC-EPODL) for bioenergy production • The presented RWC-EPODL model majorly focuses on the recognition and classification of recycling waste materials. • The proposed RWC-EPODL model uses AX-RetinaNet model for the recognition of waste objects. • The proposed model employs the EPO algorithm with stacked auto-encoder (SAE) model for waste classification. • To demonstrate the improved outcomes of the RWC-EPODL model, a series of experiments has been conducted to test the model. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
46. Adversarial Examples-Security Threats to COVID-19 Deep Learning Systems in Medical IoT Devices.
- Author
-
Rahman A, Hossain MS, Alrajeh NA, and Alsolami F
- Abstract
Medical IoT devices are rapidly becoming part of management ecosystems for pandemics such as COVID-19. Existing research shows that deep learning (DL) algorithms have been successfully used by researchers to identify COVID-19 phenomena from raw data obtained from medical IoT devices. Some examples of IoT technology are radiological media, such as CT scanning and X-ray images, body temperature measurement using thermal cameras, safe social distancing identification using live face detection, and face mask detection from camera images. However, researchers have identified several security vulnerabilities in DL algorithms to adversarial perturbations. In this article, we have tested a number of COVID-19 diagnostic methods that rely on DL algorithms with relevant adversarial examples (AEs). Our test results show that DL models that do not consider defensive models against adversarial perturbations remain vulnerable to adversarial attacks. Finally, we present in detail the AE generation process, implementation of the attack model, and the perturbations of the existing DL-based COVID-19 diagnostic applications. We hope that this work will raise awareness of adversarial attacks and encourages others to safeguard DL models from attacks on healthcare systems.
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.