35 results on '"Muneer, Amgad"'
Search Results
2. Beyond conventions: Unravelling perceived value's role in shaping digital-only banks' adoption
- Author
-
Saif, Mashaal A.M., Hussin, Nazimah, Husin, Maizaitulaidawati Md, Muneer, Amgad, and Alwadain, Ayed
- Published
- 2024
- Full Text
- View/download PDF
3. iVaccine-Deep: Prediction of COVID-19 mRNA vaccine degradation using deep learning
- Author
-
Muneer, Amgad, Fati, Suliman Mohamed, Arifin Akbar, Nur, Agustriawan, David, and Tri Wahyudi, Setyanto
- Published
- 2022
- Full Text
- View/download PDF
4. Computational identification of 4-carboxyglutamate sites to supplement physiological studies using deep learning
- Author
-
Naseer, Sheraz, Ali, Rao Faizan, Fati, Suliman Mohamed, and Muneer, Amgad
- Published
- 2022
- Full Text
- View/download PDF
5. Enhancing Weather Scene Identification Using Vision Transformer.
- Author
-
Dewi, Christine, Arshed, Muhammad Asad, Christanto, Henoch Juli, Rehman, Hafiz Abdul, Muneer, Amgad, and Mumtaz, Shahzad
- Subjects
TRANSFORMER models ,COMPUTER vision ,WEATHER forecasting ,FEATURE extraction ,INTELLIGENT networks - Abstract
The accuracy of weather scene recognition is critical in a world where weather affects every aspect of our everyday lives, particularly in areas like intelligent transportation networks, autonomous vehicles, and outdoor vision systems. The importance of weather in many aspects of our life highlights the vital necessity for accurate information. Precise weather detection is especially crucial for industries like intelligent transportation, outside vision systems, and driverless cars. The outdated, unreliable, and time-consuming manual identification techniques are no longer adequate. Unmatched accuracy is required for local weather scene forecasting in real time. This work utilizes the capabilities of computer vision to address these important issues. Specifically, we employ the advanced Vision Transformer model to distinguish between 11 different weather scenarios. The development of this model results in a remarkable performance, achieving an accuracy rate of 93.54%, surpassing industry standards such as MobileNetV2 and VGG19. These findings advance computer vision techniques into new domains and pave the way for reliable weather scene recognition systems, promising extensive real-world applications across various industries. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Medi-Block Record Secure Data Sharing in Healthcare System: Issues, Solutions and Challenges.
- Author
-
Zukarnain, Zuriati Ahmad, Muneer, Amgad, Mohamad Nassir, Nur Atirah, and Almohammedi, Akram A.
- Subjects
INFORMATION sharing ,MEDICAL care ,ARTIFICIAL intelligence ,MACHINE learning ,MEDICAL records - Abstract
With the advancements in the era of artificial intelligence, blockchain, cloud computing, and big data, there is a need for secure, decentralized medical record storage and retrieval systems. While cloud storage solves storage issues, it is challenging to realize secure sharing of records over the network. Medi-block record in the healthcare system has brought a new digitalization method for patients' medical records. This centralized technology provides a symmetrical process between the hospital and doctors when patients urgently need to go to a different or nearby hospital. It enables electronic medical records to be available with the correct authentication and restricts access to medical data retrieval.Medi-block record is the consumer-centered healthcare data system that brings reliable and transparent datasets for the medical record. This study presents an extensive review of proposed solutions aiming to protect the privacy and integrity of medical data by securing data sharing for Medi-block records. It also aims to propose a comprehensive investigation of the recent advances in different methods of securing data sharing, such as using Blockchain technology, Access Control, Privacy-Preserving, Proxy Re-Encryption, and Service-On- Chain approach. Finally, we highlight the open issues and identify the challenges regarding secure data sharing for Medi-block records in the healthcare systems. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
7. Validation of “Depression, Anxiety, and Stress Scales” and “Changes in Psychological Distress during COVID-19” among University Students in Malaysia
- Author
-
Isha, Ahmad Shahrul Nizam, Naji, Gehad Mohammed Ahmed, Saleem, Muhammad Shoaib, Brough, Paula, Alazzani, Abdulsamad, Ghaleb, Ebrahim A. A., Muneer, Amgad, and Alzoraiki, Mohammed
- Subjects
stress ,depression ,COVID-19 ,university students ,anxiety ,DASS-21 scale - Abstract
Objectives: This study assessed the reliability and validity of the DASS-21 self-reported measure in the context of COVID-19 on anxiety, stress, and depression. Through this Study, the psychological effect of COVID-19 on anxiety, tension, and depression amongst samples of students enrolled in 201 Malaysian private universities was assessed. Methods: The data were collected from university students through an online survey because of Malaysian Government Movement Control Order (MCO) restrictions. Two separate intervals were used for data collection (i.e., May and September 2020), as this period was associated with the pandemic. For scale validation, convergent, discriminant, and nomological validity criteria were used. Results: The outcome of a CFA model for DASS-21 yielded factor loading that is very significant. Therefore, the measure of the root means square error approximation (RMSEA) and the comparative fit index (CFI) are acceptable values that were produced, demonstrating a good fit for the data. Conclusions: This study was conducted in the Malaysian context to validate depression, anxiety, and stress among university students using the DASS-21 scale. Our findings support the reliability of using DASS-21 in the Malaysian cultural context. Lastly, we testified to the presence of depression, anxiety, and stress among university students through descriptive statistics and provided empirical evidence in this regard. Our results suggested that there was a significant presence of DASS among university students.
- Published
- 2023
- Full Text
- View/download PDF
8. Enhanced Multi-Objective Grey Wolf Optimizer with Lévy Flight and Mutation Operators for Feature Selection.
- Author
-
Al-Tashi, Qasem, Shami, Tareq M., Abdulkadir, Said Jadid, Akhir, Emelia Akashah Patah, Alwadain, Ayed, Alhussain, Hitham, Alqushaibi, Alawi, Rais, Helmi M. D., Muneer, Amgad, Saad, Maliazurina B., Jia Wu, and Mirjalili, Seyedali
- Subjects
FEATURE selection ,PARTICLE swarm optimization ,ARTIFICIAL neural networks ,GENETIC algorithms ,ACCURACY - Abstract
The process of selecting features or reducing dimensionality can be viewed as a multi-objective minimization problem in which both the number of features and error rate must be minimized. While it is a multi-objective problem, current methods tend to treat feature selection as a single-objective optimization task. This paper presents enhanced multi-objective grey wolf optimizer with Lévy flight and mutation phase (LMuMOGWO) for tackling feature selection problems. The proposed approach integrates two effective operators into the existing Multi-objective Grey Wolf optimizer (MOGWO): a Lévy flight and a mutation operator. The Lévy flight, a type of random walk with jump size determined by the Lévy distribution, enhances the global search capability of MOGWO, with the objective of maximizing classification accuracy while minimizing the number of selected features. The mutation operator is integrated to add more informative features that can assist in enhancing classification accuracy. As feature selection is a binary problem, the continuous search space is converted into a binary space using the sigmoid function. To evaluate the classification performance of the selected feature subset, the proposed approach employs a wrapper-based Artificial Neural Network (ANN). The effectiveness of the LMuMOGWO is validated on 12 conventional UCI benchmark datasets and compared with two existing variants of MOGWO, BMOGWO-S (based sigmoid), BMOGWO-V (based tanh) as well as Non-dominated Sorting Genetic Algorithm II (NSGA-II) and Multi-objective Particle Swarm Optimization (BMOPSO). The results demonstrate that the proposed LMuMOGWO approach is capable of successfully evolving and improving a set of randomly generated solutions for a given optimization problem. Moreover, the proposed approach outperforms existing approaches in most cases in terms of classification error rate, feature reduction, and computational cost. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
9. Automated Cellular-Level Dual Global Fusion of Whole-Slide Imaging for Lung Adenocarcinoma Prognosis.
- Author
-
Diao, Songhui, Chen, Pingjun, Showkatian, Eman, Bandyopadhyay, Rukhmini, Rojas, Frank R., Zhu, Bo, Hong, Lingzhi, Aminu, Muhammad, Saad, Maliazurina B., Salehjahromi, Morteza, Muneer, Amgad, Sujit, Sheeba J., Behrens, Carmen, Gibbons, Don L., Heymach, John V., Kalhor, Neda, Wistuba, Ignacio I., Solis Soto, Luisa M., Zhang, Jianjun, and Qin, Wenjian
- Subjects
ADENOCARCINOMA ,LUNG cancer ,BLOOD vessels ,CYTOCHEMISTRY ,DIAGNOSTIC imaging ,LEARNING strategies ,COMPARATIVE studies ,CYTOLOGY - Abstract
Simple Summary: Lung cancer is the leading cause of cancer death in the United States and worldwide. Currently, deep learning–based methods show significant advances and potential in pathology and can guide lung cancer diagnosis and prognosis prediction. In this study, we present a fully automated cellular-level survival prediction pipeline that uses histopathologic images of lung adenocarcinoma to predict survival risk based on dual global feature fusion. The results show meaningful, convincing, and comprehensible survival prediction ability and manifest the potential of our proposed pipeline for application to other malignancies. Histopathologic whole-slide images (WSI) are generally considered the gold standard for cancer diagnosis and prognosis. Survival prediction based on WSI has recently attracted substantial attention. Nevertheless, it remains a central challenge owing to the inherent difficulties of predicting patient prognosis and effectively extracting informative survival-specific representations from WSI with highly compounded gigapixels. In this study, we present a fully automated cellular-level dual global fusion pipeline for survival prediction. Specifically, the proposed method first describes the composition of different cell populations on WSI. Then, it generates dimension-reduced WSI-embedded maps, allowing for efficient investigation of the tumor microenvironment. In addition, we introduce a novel dual global fusion network to incorporate global and inter-patch features of cell distribution, which enables the sufficient fusion of different types and locations of cells. We further validate the proposed pipeline using The Cancer Genome Atlas lung adenocarcinoma dataset. Our model achieves a C-index of 0.675 (±0.05) in the five-fold cross-validation setting and surpasses comparable methods. Further, we extensively analyze embedded map features and survival probabilities. These experimental results manifest the potential of our proposed pipeline for applications using WSI in lung adenocarcinoma and other malignancies. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
10. Unmasking Deception: Empowering Deepfake Detection with Vision Transformer Network.
- Author
-
Arshed, Muhammad Asad, Alwadain, Ayed, Faizan Ali, Rao, Mumtaz, Shahzad, Ibrahim, Muhammad, and Muneer, Amgad
- Subjects
DECEPTION ,FACIAL expression ,DEEPFAKES - Abstract
With the development of image-generating technologies, significant progress has been made in the field of facial manipulation techniques. These techniques allow people to easily modify media information, such as videos and images, by substituting the identity or facial expression of one person with the face of another. This has significantly increased the availability and accessibility of such tools and manipulated content termed 'deepfakes'. Developing an accurate method for detecting fake images needs time to prevent their misuse and manipulation. This paper examines the capabilities of the Vision Transformer (ViT), i.e., extracting global features to detect deepfake images effectively. After conducting comprehensive experiments, our method demonstrates a high level of effectiveness, achieving a detection accuracy, precision, recall, and F1 rate of 99.5 to 100% for both the original and mixture data set. According to our existing understanding, this study is a research endeavor incorporating real-world applications, specifically examining Snapchat-filtered images. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
11. Cyberbullying Detection on Twitter Using Deep Learning-Based Attention Mechanisms and Continuous Bag of Words Feature Extraction.
- Author
-
Fati, Suliman Mohamed, Muneer, Amgad, Alwadain, Ayed, and Balogun, Abdullateef O.
- Subjects
- *
CONVOLUTIONAL neural networks , *SOCIAL media , *FEATURE extraction , *CYBERBULLYING , *DEEP learning , *MICROBLOGS , *CYBERSPACE - Abstract
Since social media platforms are widely used and popular, they have given us more opportunities than we can even imagine. Despite all of the known benefits, some users may abuse these opportunities to humiliate, insult, bully, and harass other people. This issue explains why there is a need to reduce such negative activities and create a safe cyberspace for innocent people by detecting cyberbullying activity. This study provides a comparative analysis of deep learning methods used to test and evaluate their effectiveness regarding a well-known global Twitter dataset. To recognize abusive tweets and overcome existing challenges, attention-based deep learning methods are introduced. The word2vec with CBOW concatenated formed the weights included in the embedding layer and was used to extract the features. The feature vector was input into a convolution and pooling mechanism, reducing the feature dimensionality while learning the position-invariant of the offensive words. A SoftMax function predicts feature classification. Using benchmark experimental datasets and well-known evaluation measures, the convolutional neural network model with attention-based long- and short-term memory was found to outperform other DL methods. The proposed cyberbullying detection methods were evaluated using benchmark experimental datasets and well-known evaluation measures. Finally, the results demonstrated the superiority of the attention-based 1D convolutional long short-term memory (Conv1DLSTM) classifier over the other implemented methods. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
12. Cyberbullying Detection on Social Media Using Stacking Ensemble Learning and Enhanced BERT.
- Author
-
Muneer, Amgad, Alwadain, Ayed, Ragab, Mohammed Gamal, and Alqushaibi, Alawi
- Subjects
- *
CYBERBULLYING , *LANGUAGE models , *SOCIAL media , *NATURAL language processing , *FEATURE extraction - Abstract
The prevalence of cyberbullying on Social Media (SM) platforms has become a significant concern for individuals, organizations, and society as a whole. The early detection and intervention of cyberbullying on social media are critical to mitigating its harmful effects. In recent years, ensemble learning has shown promising results for detecting cyberbullying on social media. This paper presents an ensemble stacking learning approach for detecting cyberbullying on Twitter using a combination of Deep Neural Network methods (DNNs). It also introduces BERT-M, a modified BERT model. The dataset used in this study was collected from Twitter and preprocessed to remove irrelevant information. The feature extraction process involved utilizing word2vec with Continuous Bag of Words (CBOW) to form the weights in the embedding layer. These features were then fed into a convolutional and pooling mechanism, effectively reducing their dimensionality, and capturing the position-invariant characteristics of the offensive words. The validation of the proposed stacked model and BERT-M was performed using well-known model evaluation measures. The stacked model achieved an F1-score of 0.964, precision of 0.950, recall of 0.92 and the detection time reported was 3 min, which surpasses the previously reported accuracy and speed scores for all known NLP detectors of cyberbullying, including standard BERT and BERT-M. The results of the experiment showed that the stacking ensemble learning approach achieved an accuracy of 97.4% in detecting cyberbullying on Twitter dataset and 90.97% on combined Twitter and Facebook dataset. The results demonstrate the effectiveness of the proposed stacking ensemble learning approach in detecting cyberbullying on SM and highlight the importance of combining multiple models for improved performance. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
13. Machine Learning Models for the Identification of Prognostic and Predictive Cancer Biomarkers: A Systematic Review.
- Author
-
Al-Tashi, Qasem, Saad, Maliazurina B., Muneer, Amgad, Qureshi, Rizwan, Mirjalili, Seyedali, Sheshadri, Ajay, Le, Xiuning, Vokes, Natalie I., Zhang, Jianjun, and Wu, Jia
- Subjects
MACHINE learning ,TUMOR markers ,STATISTICAL learning ,IDENTIFICATION ,INDIVIDUALIZED medicine - Abstract
The identification of biomarkers plays a crucial role in personalized medicine, both in the clinical and research settings. However, the contrast between predictive and prognostic biomarkers can be challenging due to the overlap between the two. A prognostic biomarker predicts the future outcome of cancer, regardless of treatment, and a predictive biomarker predicts the effectiveness of a therapeutic intervention. Misclassifying a prognostic biomarker as predictive (or vice versa) can have serious financial and personal consequences for patients. To address this issue, various statistical and machine learning approaches have been developed. The aim of this study is to present an in-depth analysis of recent advancements, trends, challenges, and future prospects in biomarker identification. A systematic search was conducted using PubMed to identify relevant studies published between 2017 and 2023. The selected studies were analyzed to better understand the concept of biomarker identification, evaluate machine learning methods, assess the level of research activity, and highlight the application of these methods in cancer research and treatment. Furthermore, existing obstacles and concerns are discussed to identify prospective research areas. We believe that this review will serve as a valuable resource for researchers, providing insights into the methods and approaches used in biomarker discovery and identifying future research opportunities. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
14. Type 2 Diabetes Risk Prediction Using Deep Convolutional Neural Network Based-Bayesian Optimization.
- Author
-
Alqushaibi, Alawi, Hasan, Mohd Hilmi, Abdulkadir, Said Jadid, Muneer, Amgad, Gamal, Mohammed, Al-Tashi, Qasem, Taib, Shakirah Mohd, and Alhussian, Hitham
- Subjects
CONVOLUTIONAL neural networks ,TYPE 2 diabetes ,OPTIMIZATION algorithms ,DEEP learning ,DIABETES - Abstract
Diabetes mellitus is a long-term condition characterized by hyperglycemia. It could lead to plenty of difficulties. According to rising morbidity in recent years, the world’s diabetic patients will exceed 642 million by 2040, implying that one out of every ten persons will be diabetic. There is no doubt that this startling figure requires immediate attention from industry and academia to promote innovation and growth in diabetes risk prediction to save individuals’ lives. Due to its rapid development, deep learning (DL) was used to predict numerous diseases. However, DL methods still suffer from their limited prediction performance due to the hyperparameters selection and parameters optimization. Therefore, the selection of hyper-parameters is critical in improving classification performance. This study presents Convolutional Neural Network (CNN) that has achieved remarkable results in many medical domains where the Bayesian optimization algorithm (BOA) has been employed for hyperparameters selection and parameters optimization. Two issues have been investigated and solved during the experiment to enhance the results. The first is the dataset class imbalance, which is solved using Synthetic Minority Oversampling Technique (SMOTE) technique. The second issue is the model’s poor performance, which has been solved using the Bayesian optimization algorithm. The findings indicate that the Bayesian based-CNN model superbases all the state-of-the-art models in the literature with an accuracy of 89.36%, F1-score of 0.88.6, and Matthews Correlation Coefficient (MCC) of 0.88.6. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
15. DeepSDC: Deep Ensemble Learner for the Classification of Social-Media Flooding Events.
- Author
-
Hanif, Muhammad, Waqas, Muhammad, Muneer, Amgad, Alwadain, Ayed, Tahir, Muhammad Atif, and Rafi, Muhammad
- Abstract
Disasters such as earthquakes, droughts, floods, and volcanoes adversely affect human lives and valuable resources. Therefore, various response systems have been designed, which assist in mitigating the impact of disasters and facilitating relief activities in the aftermath of a disaster. These response systems require timely and accurate information about affected areas. In recent years, social media has provided access to high-volume real-time data, which can be used for advanced solutions to numerous problems, including disasters. Social-media data combines two modalities (text and associated images), and this information can be used to detect disasters, such as floods. This paper proposes an ensemble learning-based Deep Social Media Data Classification (DeepSDC) approach for social-media flood-event classification. The proposed algorithm uses datasets from Twitter to detect the flooding event. The Deep Social Media Data Classification (DeepSDC) uses a two-staged ensemble-learning approach which combines separate models for textual and visual data. These models obtain diverse information from the text and images and combine the information using an ensemble-learning approach. Additionally, DeepSDC utilizes different augmentation, upsampling and downsampling techniques to tackle the class-imbalance challenge. The performance of the proposed algorithm is assessed on three publically available flood-detection datasets. The experimental results show that the proposed DeepSDC is able to produce superior performance when compared with several state-of-the-art algorithms. For the three datasets, FRMT, FCSM and DIRSM, the proposed approach produced F1 scores of 46.52, 92.87, and 92.65, respectively. The mean average precision (MAP@480) of 91.29 and 98.94 were obtained on textual and a combination of textual and visual data, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
16. Estimating Financial Fraud through Transaction-Level Features and Machine Learning.
- Author
-
Alwadain, Ayed, Ali, Rao Faizan, and Muneer, Amgad
- Subjects
FRAUD ,GENERATIVE adversarial networks ,FINANCIAL risk ,INVESTORS ,MACHINE learning - Abstract
In today's world, financial institutions (FIs) play a pivotal role in any country's economic growth and are vital for intermediation between the providers of investable funds, such as depositors, investors and users. FIs focus on developing effective policies for financial fraud risk mitigation however, timely prediction of financial fraud risk helps overcome it effectively and efficiently. Thus, herein, we propose a novel approach for predicting financial fraud using machine learning. We have used transaction-level features of 6,362,620 transactions from a synthetic dataset and have fed them to various machine-learning classifiers. The correlation of different features is also analysed. Furthermore, around 5000 more data samples were generated using a Conditional Generative Adversarial Network for Tabular Data (CTGAN). The evaluation of the proposed predictor showed higher accuracies which outperformed the previously existing machine-learning-based approaches. Among all 27 classifiers, XGBoost outperformed all other classifiers in terms of accuracy score with 0.999 accuracies, however, when evaluated through exhaustive repeated 10-fold cross-validation, the XGBoost still gave an average accuracy score of 0.998. The findings are particularly relevant to financial institutions and are important for regulators and policymakers who aim to develop new and effective policies for risk mitigation against financial fraud. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
17. Hyper-Parameter Optimization of Semi-Supervised GANs Based-Sine Cosine Algorithm for Multimedia Datasets.
- Author
-
Al-Ragehi, Anas, Abdulkadir, Said Jadid, Muneer, Amgad, Sadeq, Safwan, and Al-Tashi, Qasem
- Subjects
GENERATIVE adversarial networks ,MULTIMEDIA systems ,ALGORITHMS ,DEEP learning - Abstract
Generative Adversarial Networks (GANs) are neural networks that allow models to learn deep representations without requiring a large amount of training data. Semi-Supervised GAN Classifiers are a recent innovation in GANs, where GANs are used to classify generated images into real and fake and multiple classes, similar to a general multi-class classifier. However, GANs have a sophisticated design that can be challenging to train. This is because obtaining the proper set of parameters for all models-generator, discriminator, and classifier is complex. As a result, training a single GAN model for different datasets may not produce satisfactory results. Therefore, this study proposes an SGAN model (Semi-Supervised GAN Classifier). First, a baseline model was constructed. The model was then enhanced by leveraging the Sine-Cosine Algorithm and Synthetic Minority Oversampling Technique (SMOTE). SMOTE was used to address class imbalances in the dataset, while Sine Cosine Algorithm (SCA) was used to optimize the weights of the classifier models. The optimal set of hyperparameters (learning rate and batch size) were obtained using grid manual search. Four well-known benchmark datasets and a set of evaluation measures were used to validate the proposed model. The proposed method was then compared against existing models, and the results on each dataset were recorded and demonstrated the effectiveness of the proposed model. The proposed model successfully showed improved test accuracy scores of 1%, 2%, 15%, and 5% on benchmarking multimedia datasets; Modified National Institute of Standards and Technology (MNIST) digits, Fashion MNIST, Pneumonia Chest X-ray, and Facial Emotion Detection Dataset, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
18. Soft and Hard Total Quality Management Practices Promote Industry 4.0 Readiness: A SEM-Neural Network Approach.
- Author
-
Ali, Kashif, Johl, Satirenjit Kaur, Muneer, Amgad, Alwadain, Ayed, and Ali, Rao Faizan
- Abstract
Industry 4.0 (I4.0) is a technological development in the manufacturing industry that has revolutionized Total Quality Management (TQM) practices. There has been scant empirical research on the multidimensional perspective of TQM. Thus, this study aims to empirically examine the effect of the multidimensional view of TQM (soft and hard) on I4.0 readiness in small and medium-sized (SMEs) manufacturing firms. Based on the sociotechnical systems (STS) theory, a framework has been developed and validated empirically through an online survey of 209 Malaysian SMEs manufacturing firms. Unlike the existing TQM studies that used structural equation modeling (SEM), a two-stage analysis was performed in this study. First, the SEM approach was used to determine which variable significantly affects I4.0 readiness. Second, the artificial neural network (ANN) technique was adopted to rank the relative influence of significant predictors obtained from SEM. The results show that the soft and hard TQM practices have supported the I4.0 readiness. Moreover, the results highlight that hard TQM practices have mediating role between soft TQM practices and I4.0 readiness. The ANN results affirmed that customer focus is considered an important TQM factor for I4.0 managerial readiness, advanced manufacturing technology for operational readiness and top management commitment for technology readiness. In a nutshell, the SEM-ANN approach uniquely contributes to the TQM and I4.0 literature. Finally, the findings can help managers to prioritize firms' soft and hard quality practices that promote I4.0 implementation, especially in emerging economies. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
19. Short term residential load forecasting using long short-term memory recurrent neural network.
- Author
-
Muneer, Amgad, Ali, Rao Faizan, Almaghthawi, Ahmed, Taib, Shakirah Mohd, Alghamdi, Amal, and Ghaleb, Ebrahim Abdulwasea Abdullah
- Subjects
LOAD forecasting (Electric power systems) ,RECURRENT neural networks ,DEEP learning ,FORECASTING ,STATISTICAL smoothing ,SMART meters ,MOVING average process ,TIME series analysis - Abstract
Load forecasting plays an essential role in power system planning. The efficiency and reliability of the whole power system can be increased with proper planning and organization. Residential load forecasting is indispensable due to its increasing role in the smart grid environment. Nowadays, smart meters can be deployed at the residential level for collecting historical data consumption of residents. Although the employment of smart meters ensures large data availability, the inconsistency of load data makes it challenging and taxing to forecast accurately. Therefore, the traditional forecasting techniques may not suffice the purpose. However, a deep learning forecasting network-based long short-term memory (LSTM) is proposed in this paper. The powerful nonlinear mapping capabilities of RNN in time series make it effective along with the higher learning capabilities of long sequences of LSTM. The proposed method is tested and validated through available real-world data sets. A comparison of LSTM is then made with two traditionally available techniques, exponential smoothing and auto-regressive integrated moving average model (ARIMA). Real data from 12 houses over three months is used to evaluate and validate the performance of load forecasts performed using the three mentioned techniques. LSTM model has achieved the best results due to its higher capability of memorizing large data in time seriesbased predictions. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
20. Classifications of Sustainable Factors in Blockchain Adoption: A Literature Review and Bibliometric Analysis.
- Author
-
AL-Ashmori, Ammar, Basri, Shuib Bin, Dominic, P. D. D., Capretz, Luiz Fernando, Muneer, Amgad, Balogun, Abdullateef Oluwagbemiga, Gilal, Abdul Rehman, and Ali, Rao Faizan
- Abstract
Blockchain is a cutting-edge technology that is transforming and reshaping many industries. Hence, the adoption of Blockchain is becoming an increasingly significant topic. The number of publications discussing the potential of Blockchain adoption has been expanding significantly. In addition, not enough attention has been given to Blockchain adoption in the software development industry. As a result, a systematic overview to investigate the research trends in this area is needed. This study uses a Scientometric analysis and critical review to examine the evolution of Blockchain adoption research on the Web of Science Principal Collection. In addition, a systematic literature review (SLR) was conducted to identify gaps in Blockchain adoption research and the top reasons for adopting Blockchain with the intention of proposing a sustainable adoption framework. This study extends the body of knowledge by discussing the most influential countries, authors, organizations, publication themes, and most cited publications on Blockchain adoption research. Additionally, this study identifies the 30 relevant studies from the Web of Science and Scopus, including their industries, countries, methods, and respondent sample size, and the top 18 adoption factors among them. Consequently, this study proposes a suitable Blockchain adoption framework based on these top 18 factors. Finally, this study's aim and unique contribution is to serve as an initial launching point for upcoming Blockchain adoption in software development industry research. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
21. Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges.
- Author
-
Zukarnain, Zuriati Ahmad, Muneer, Amgad, and Ab Aziz, Mohd Khairulanuar
- Subjects
- *
HUMAN fingerprints , *PUBLIC key cryptography , *COMPUTER passwords - Abstract
Smartphone devices have become an essential part of our daily activities for performing various essential applications containing very confidential information. For this reason, the security of the device and the transactions is required to ensure that the transactions are performed legally. Most regular mobile users' authentication methods used are passwords and short messages. However, numerous security vulnerabilities are inherent in various authentication schemes. Fingerprint identification and face recognition technology sparked a massive wave of adoption a few years back. The international mobile equipment identity (IMEI) and identity-based public key cryptography (ID-based PKC) have also become widely used options. More complex methods have been introduced, such as the management flow that combines transaction key creation, encryption, and decryption in processing users' personal information and biometric features. There is also a combination of multiple user-based authentications, such as user's trip routes initialization with the coordinates of home and office to set template trajectories and stay points for authentication. Therefore, this research aimed to identify the issues with the available authentication methods and the best authentication solution while overcoming the challenges. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
22. A Hybrid Deep Learning-Based Unsupervised Anomaly Detection in High Dimensional Data.
- Author
-
Muneer, Amgad, Taib, Shakirah Mohd, Fati, Suliman Mohamed, Balogun, Abdullateef O., and Aziz, Izzatdin Abdul
- Subjects
ANOMALY detection (Computer security) ,MATHEMATICAL optimization ,DEEP learning ,GAS turbines ,BIG data - Abstract
Anomaly detection in high dimensional data is a critical research issue with serious implication in the real-world problems. Many issues in this field still unsolved, so several modern anomaly detection methods struggle to maintain adequate accuracy due to the highly descriptive nature of big data. Such a phenomenon is referred to as the “curse of dimensionality” that affects traditional techniques in terms of both accuracy and performance. Thus, this research proposed a hybrid model based on Deep Autoencoder Neural Network (DANN) with five layers to reduce the difference between the input and output. The proposed model was applied to a real-world gas turbine (GT) dataset that contains 87620 columns and 56 rows. During the experiment, two issues have been investigated and solved to enhance the results. The first is the dataset class imbalance, which solved using SMOTE technique. The second issue is the poor performance, which can be solved using one of the optimization algorithms. Several optimization algorithms have been investigated and tested, including stochastic gradient descent (SGD), RMSprop, Adam and Adamax. However, Adamax optimization algorithm showed the best results when employed to train the DANN model. The experimental results show that our proposed model can detect the anomalies by efficiently reducing the high dimensionality of dataset with accuracy of 99.40%, F1-score of 0.9649, Area Under the Curve (AUC) rate of 0.9649, and a minimal loss function during the hybrid model training. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
23. Location-Aware Personalized Traveler Recommender System (LAPTA) Using Collaborative Filtering KNN.
- Author
-
Al-Ghobari, Mohanad, Muneer, Amgad, and Fati, Suliman Mohamed
- Subjects
RECOMMENDER systems ,GLOBAL Positioning System ,TOURIST attractions ,TAGS (Metadata) ,BEHAVIORAL research ,WATER filtration - Abstract
Many tourists who travel to explore different cultures and cities worldwide aim to find the best tourist sites, accommodation, and food according to their interests. This objective makes it harder for tourists to decide and plan where to go and what to do. Aside from hiring a local guide, an option which is beyond most travelers' budgets, the majority of sojourners nowadays use mobile devices to search for or recommend interesting sites on the basis of user reviews. Therefore, this work utilizes the prevalent recommender systems and mobile app technologies to overcome this issue. Accordingly, this study proposes location-aware personalized traveler assistance (LAPTA), a system which integrates user preferences and the global positioning system (GPS) to generate personalized and location-aware recommendations. That integration will enable the enhanced recommendation of the developed scheme relative to those from the traditional recommender systems used in customer ratings. Specifically, LAPTA separates the data obtained from Google locations into name and category tags. After the data separation, the system fetches the keywords from the user's input according to the user's past research behavior. The proposed system uses the K-Nearest algorithm to match the name and category tags with the user's input to generate personalized suggestions. The system also provides suggestions on the basis of nearby popular attractions using the Google point of interest feature to enhance system usability. The experimental results showed that LAPTA could provide more reliable and accurate recommendations compared to the reviewed recommendation applications. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
24. Smart security door system using SMS based energy harvest.
- Author
-
Hamas, Abdullah, Muneer, Amgad, and Fati, Suliman Mohamed
- Subjects
ENERGY harvesting ,SECURITY systems ,SLIDING doors ,ENERGY consumption ,MOTION detectors ,ALTERNATIVE fuels ,HARVESTING ,MICROBIAL fuel cells - Abstract
Over the last decade, different studies have been conducted to increase security to identify sensor technology and provide alternative energy with other energy harvest techniques such as vibration energy harvester and sun energy harvester. There is no combinational approach to utilize the door to create energy and use it for security measures in the literature, making our system different and unique. This proposed system comprises the security and the energy harvest; the security section utilizes a motion detector sensor to detect intruders. For instance, the magnetic door lock type firmly locks the door, which can only open with a generated password. On the other side, the energy harvest section utilizes the door motion to generate electricity for the system, which solves power shortage and limited battery life issues. Moreover, this study includes a GSM module that allows authorized owners to receive a generated password as a security enhancement. This design mainly focuses on improving or optimizing the conventional security doors' overall performance as sliding door, panel door, or revolving door. The experimental results show the system efficiency in terms of power generation and the time needed to authenticate the property owner. Notably, the power generator can generate electricity more rapidly, while the needed time to receive the mobile device's security code is around 3.6 seconds. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
25. A smart fire detection system using IoT technology with automatic water sprinkler.
- Author
-
Alqourabah, Hamood, Muneer, Amgad, and Fati, Suliman Mohamed
- Subjects
FIRE detectors ,SPRINKLERS ,FIRE sprinklers ,INTERNET of things ,FIRE departments ,FALSE alarms - Abstract
House combustion is one of the main concerns for builders, designers, and property residents. Singular sensors were used for a long time in the event of detection of a fire, but these sensors cannot measure the amount of fire to alert the emergency response units. To address this problem, this study aims to implement a smart fire detection system that would not only detect the fire using integrated sensors but also alert property owners, emergency services, and local police stations to protect lives and valuable assets simultaneously. The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the system. To get real-life data without putting human lives in danger, an IoT technology has been implemented to provide the fire department with the necessary data. Finally, the main feature of the proposed system is to minimize false alarms, which, in turn, makes this system more reliable. The experimental results showed the superiority of our model in terms of affordability, effectiveness, and responsiveness as the system uses the Ubidots platform, which makes the data exchange faster and reliable. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
26. Smart health monitoring system using IoT based smart fitness mirror.
- Author
-
Muneer, Amgad, Fati, Suliman Mohamed, and Fuddah, Saddam
- Subjects
- *
BODY mass index , *LEAN body mass , *BODY composition , *BIOELECTRIC impedance , *ELECTRIC currents , *ONLINE monitoring systems - Abstract
The smart fitness mirror proposed in this researchaims to provide the users with a platform to monitor their health and fitness status on a daily basis. The system employs a number of sensors to monitor the body mass index (BMI) and amount of body fat present in the user's body. A weight scale consisting of four load sensors has been implemented to obtain the weight of the user whereas an ultrasonic sensor has been used to measure the height of the user. In addition, four electrode plates have been implemented on the foot weight scale to infuse a small amount of electric current (1mA) for BIA (bioelectrical impedance analysis) to estimate the amount of body fat percentage, lean body mass and total body water. An IR temperature sensor has been implemented in the research to measure the temperature of the user's body from the forehead. Tests conducted on the system illustrate that it is able to accurately compute the body mass index and perform a bioelectrical impedance analysis on the user. The system is able to achieve a 92.5 % and 93.7 % accuracy in determining the body mass index and body fat percentage respectively. An accuracy of 95.3 % was observed in the determination of the body temperature. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
27. Correction: Fati et al. Cyberbullying Detection on Twitter Using Deep Learning-Based Attention Mechanisms and Continuous Bag of Words Feature Extraction. Mathematics 2023, 11 , 3567.
- Author
-
Fati, Suliman Mohamed, Muneer, Amgad, Alwadain, Ayed, and Balogun, Abdullateef O.
- Subjects
- *
FEATURE extraction , *CYBERBULLYING , *STATE universities & colleges , *MATHEMATICS - Abstract
This correction notice addresses a mistake in the original paper titled "Cyberbullying Detection on Twitter Using Deep Learning-Based Attention Mechanisms and Continuous Bag of Words Feature Extraction." The authors apologize for omitting Prince Sultan University (PSU) from the funding statement. PSU was one of the main funders for the research, which was a collaborative effort between King Saud University, Universiti Teknologi Petronas, and Prince Sultan University. The authors express their appreciation for the generous support from these universities and state that the scientific conclusions of the paper remain unaffected. The funding statement in the original publication has been updated to include PSU. [Extracted from the article]
- Published
- 2023
- Full Text
- View/download PDF
28. Distributed Hybrid Double-Spending Attack Prevention Mechanism for Proof-of-Work and Proof-of-Stake Blockchain Consensuses.
- Author
-
Akbar, Nur Arifin, Muneer, Amgad, ElHakim, Narmine, and Fati, Suliman Mohamed
- Subjects
BLOCKCHAINS ,ALGORITHMS ,CRYPTOCURRENCIES ,FAULT-tolerant computing ,BITCOIN ,INDUSTRIAL security - Abstract
Blockchain technology is a sustainable technology that offers a high level of security for many industrial applications. Blockchain has numerous benefits, such as decentralisation, immutability and tamper-proofing. Blockchain is composed of two processes, namely, mining (the process of adding a new block or transaction to the global public ledger created by the previous block) and validation (the process of validating the new block added). Several consensus protocols have been introduced to validate blockchain transactions, Proof-of-Work (PoW) and Proof-of-Stake (PoS), which are crucial to cryptocurrencies, such as Bitcoin. However, these consensus protocols are vulnerable to double-spending attacks. Amongst these attacks, the 51% attack is the most prominent because it involves forking a blockchain to conduct double spending. Many attempts have been made to solve this issue, and examples include delayed proof-of-work (PoW) and several Byzantine fault tolerance mechanisms. These attempts, however, suffer from delay issues and unsorted block sequences. This study proposes a hybrid algorithm that combines PoS and PoW mechanisms to provide a fair mining reward to the miner/validator by conducting forking to combine PoW and PoS consensuses. As demonstrated by the experimental results, the proposed algorithm can reduce the possibility of intruders performing double mining because it requires achieving 100% dominance in the network, which is impossible. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
29. Data-Driven Deep Learning-Based Attention Mechanism for Remaining Useful Life Prediction: Case Study Application to Turbofan Engine Analysis.
- Author
-
Muneer, Amgad, Taib, Shakirah Mohd, Naseer, Sheraz, Ali, Rao Faizan, and Aziz, Izzatdin Abdul
- Subjects
TURBOFAN engines ,PROGNOSTIC models ,SIGNAL processing ,MACHINE learning ,FORECASTING - Abstract
Accurately predicting the remaining useful life (RUL) of the turbofan engine is of great significance for improving the reliability and safety of the engine system. Due to the high dimension and complex features of sensor data in RUL prediction, this paper proposes four data-driven prognostic models based on deep neural networks (DNNs) with an attention mechanism. To improve DNN feature extraction, data are prepared using a sliding time window technique. The raw data collected after normalizing is simply fed into the suggested network, requiring no prior knowledge of prognostics or signal processing and simplifying the proposed method's applicability. In order to verify the RUL prediction ability of the proposed DNN techniques, the C-MAPSS benchmark dataset of the turbofan engine system is validated. The experimental results showed that the developed long short-term memory (LSTM) model with attention mechanism achieved accurate RUL prediction in both scenarios with a high degree of robustness and generalization ability. Furthermore, the proposed model performance outperforms several state-of-the-art prognosis methods, where the LSTM-based model with attention mechanism achieved an RMSE of 12.87 and 11.23 for FD002 and FD003 subset of data, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
30. Deep-Learning Based Prognosis Approach for Remaining Useful Life Prediction of Turbofan Engine.
- Author
-
Muneer, Amgad, Taib, Shakirah Mohd, Fati, Suliman Mohamed, and Alhussian, Hitham
- Subjects
- *
TURBOFAN engines , *DEEP learning , *CONVOLUTIONAL neural networks , *STANDARD deviations , *FEATURE selection , *FEATURE extraction - Abstract
The entire life cycle of a turbofan engine is a type of asymmetrical process in which each engine part has different characteristics. Extracting and modeling the engine symmetry characteristics is significant in improving remaining useful life (RUL) predictions for aircraft components, and it is critical for an effective and reliable maintenance strategy. Such predictions can improve the maximum operating availability and reduce maintenance costs. Due to the high nonlinearity and complexity of mechanical systems, conventional methods are unable to satisfy the needs of medium- and long-term prediction problems and frequently overlook the effect of temporal information on prediction performance. To address this issue, this study presents a new attention-based deep convolutional neural network (DCNN) architecture to predict the RUL of turbofan engines. The prognosability metric was used for feature ranking and selection, whereas a time window method was employed for sample preparation to take advantage of multivariate temporal information for better feature extraction by means of an attention-based DCNN model. The validation of the proposed model was conducted using a well-known benchmark dataset and evaluation measures such as root mean square error (RMSE) and asymmetric scoring function (score) were used to validate the proposed approach. The experimental results show the superiority of the proposed approach to predict the RUL of a turbofan engine. The attention-based DCNN model achieved the best scores on the FD001 independent testing dataset, with an RMSE of 11.81 and a score of 223. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
31. The Assessment of Big Data Adoption Readiness with a Technology–Organization–Environment Framework: A Perspective towards Healthcare Employees.
- Author
-
Ghaleb, Ebrahim A. A., Dominic, P. D. D., Fati, Suliman Mohamed, Muneer, Amgad, and Ali, Rao Faizan
- Abstract
Big data is rapidly being seen as a new frontier for improving organizational performance. However, it is still in its early phases of implementation in developing countries' healthcare organizations. As data-driven insights become critical competitive advantages, it is critical to ascertain which elements influence an organization's decision to adopt big data. The aim of this study is to propose and empirically test a theoretical framework based on technology–organization–environment (TOE) factors to identify the level of readiness of big data adoption in developing countries' healthcare organizations. The framework empirically tested 302 Malaysian healthcare employees. The structural equation modeling was used to analyze the collected data. The results of the study demonstrated that technology, organization, and environment factors can significantly contribute towards big data adoption in healthcare organizations. However, the complexity of technology factors has shown less support for the notion. For technology practitioners, this study showed how to enhance big data adoption in healthcare organizations through TOE factors. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
32. A Continuous Cuffless Blood Pressure Estimation Using Tree-Based Pipeline Optimization Tool.
- Author
-
Fati, Suliman Mohamed, Muneer, Amgad, Akbar, Nur Arifin, Taib, Shakirah Mohd, Gibali, Aviv, Kountchev, Roumen, and Mironov, Rumen
- Subjects
- *
BLOOD pressure , *PULSE oximeters , *SYSTOLIC blood pressure , *BLOOD volume , *HYPERTENSION , *FEATURE selection , *MACHINE learning , *ISCHEMIC preconditioning - Abstract
High blood pressure (BP) may lead to further health complications if not monitored and controlled, especially for critically ill patients. Particularly, there are two types of blood pressure monitoring, invasive measurement, whereby a central line is inserted into the patient's body, which is associated with infection risks. The second measurement is cuff-based that monitors BP by detecting the blood volume change at the skin surface using a pulse oximeter or wearable devices such as a smartwatch. This paper aims to estimate the blood pressure using machine learning from photoplethysmogram (PPG) signals, which is obtained from cuff-based monitoring. To avoid the issues associated with machine learning such as improperly choosing the classifiers and/or not selecting the best features, this paper utilized the tree-based pipeline optimization tool (TPOT) to automate the machine learning pipeline to select the best regression models for estimating both systolic BP (SBP) and diastolic BP (DBP) separately. As a pre-processing stage, notch filter, band-pass filter, and zero phase filtering were applied by TPOT to eliminate any potential noise inherent in the signal. Then, the automated feature selection was performed to select the best features to estimate the BP, including SBP and DBP features, which are extracted using random forest (RF) and k-nearest neighbors (KNN), respectively. To train and test the model, the PhysioNet global dataset was used, which contains 32.061 million samples for 1000 subjects. Finally, the proposed approach was evaluated and validated using the mean absolute error (MAE). The results obtained were 6.52 mmHg for SBS and 4.19 mmHg for DBP, which show the superiority of the proposed model over the related works. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
33. iAmideV-Deep: Valine Amidation Site Prediction in Proteins Using Deep Learning and Pseudo Amino Acid Compositions.
- Author
-
Naseer, Sheraz, Ali, Rao Faizan, Muneer, Amgad, Fati, Suliman Mohamed, and Vetro, Calogero
- Subjects
AMIDATION ,AMINO acids ,VALINE ,BIOACTIVE compounds ,PROTEOLYSIS ,DEEP learning ,SIGNAL convolution - Abstract
Amidation is an important post translational modification where a peptide ends with an amide group (–NH2) rather than carboxyl group (–COOH). These amidated peptides are less sensitive to proteolytic degradation with extended half-life in the bloodstream. Amides are used in different industries like pharmaceuticals, natural products, and biologically active compounds. The in-vivo, ex-vivo, and in-vitro identification of amidation sites is a costly and time-consuming but important task to study the physiochemical properties of amidated peptides. A less costly and efficient alternative is to supplement wet lab experiments with accurate computational models. Hence, an urgent need exists for efficient and accurate computational models to easily identify amidated sites in peptides. In this study, we present a new predictor, based on deep neural networks (DNN) and Pseudo Amino Acid Compositions (PseAAC), to learn efficient, task-specific, and effective representations for valine amidation site identification. Well-known DNN architectures are used in this contribution to learn peptide sequence representations and classify peptide chains. Of all the different DNN based predictors developed in this study, Convolutional neural network-based model showed the best performance surpassing all other DNN based models and reported literature contributions. The proposed model will supplement in-vivo methods and help scientists to determine valine amidation very efficiently and accurately, which in turn will enhance understanding of the valine amidation in different biological processes. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
34. A Comparative Analysis of Machine Learning Techniques for Cyberbullying Detection on Twitter.
- Author
-
Muneer, Amgad and Fati, Suliman Mohamed
- Subjects
CYBERBULLYING ,MACHINE learning ,RANDOM forest algorithms ,SUPPORT vector machines ,MICROBLOGS ,SOCIAL media - Abstract
The advent of social media, particularly Twitter, raises many issues due to a misunderstanding regarding the concept of freedom of speech. One of these issues is cyberbullying, which is a critical global issue that affects both individual victims and societies. Many attempts have been introduced in the literature to intervene in, prevent, or mitigate cyberbullying; however, because these attempts rely on the victims' interactions, they are not practical. Therefore, detection of cyberbullying without the involvement of the victims is necessary. In this study, we attempted to explore this issue by compiling a global dataset of 37,373 unique tweets from Twitter. Moreover, seven machine learning classifiers were used, namely, Logistic Regression (LR), Light Gradient Boosting Machine (LGBM), Stochastic Gradient Descent (SGD), Random Forest (RF), AdaBoost (ADB), Naive Bayes (NB), and Support Vector Machine (SVM). Each of these algorithms was evaluated using accuracy, precision, recall, and F1 score as the performance metrics to determine the classifiers' recognition rates applied to the global dataset. The experimental results show the superiority of LR, which achieved a median accuracy of around 90.57%. Among the classifiers, logistic regression achieved the best F1 score (0.928), SGD achieved the best precision (0.968), and SVM achieved the best recall (1.00). [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
35. Automated Health Monitoring System Using Advanced Technology.
- Author
-
Muneer, Amgad and Fati, Suliman Mohamed
- Published
- 2019
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.