49 results on '"AlSalman, Hussain"'
Search Results
2. Extended dipeptide composition framework for accurate identification of anticancer peptides
- Author
-
Ullah, Faizan, Salam, Abdu, Nadeem, Muhammad, Amin, Farhan, AlSalman, Hussain, Abrar, Mohammad, and Alfakih, Taha
- Published
- 2024
- Full Text
- View/download PDF
3. The adoption and use of learning analytics tools to improve decision making in higher learning institutions: An extension of technology acceptance model
- Author
-
Mukred, Muaadh, Mokhtar, Umi Asma’, Hawash, Burkan, AlSalman, Hussain, and Zohaib, Muhammad
- Published
- 2024
- Full Text
- View/download PDF
4. Conventional to online education during COVID-19 pandemic: Do develop and underdeveloped nations cope alike
- Author
-
Qazi, Atika, Naseer, Khulla, Qazi, Javaria, AlSalman, Hussain, Naseem, Usman, Yang, Shuiqing, Hardaker, Glenn, and Gumaei, Abdu
- Published
- 2020
- Full Text
- View/download PDF
5. Optimizing Energy Usage and Smoothing Load Profile via a Home Energy Management Strategy with Vehicle-to-Home and Energy Storage System.
- Author
-
Abdalla, Modawy Adam Ali, Min, Wang, Amran, Gehad Abdullah, Alabrah, Amerah, Mohammed, Omer Abbaker Ahmed, AlSalman, Hussain, and Saleh, Bassiouny
- Abstract
This study investigates an energy utilization optimization strategy in a smart home for charging electric vehicles (EVs) with/without a vehicle-to-home (V2H) and/or household energy storage system (HESS) to improve household energy utilization, smooth the load profile, and reduce electricity bills. The proposed strategy detects EV arrival and departure time, establishes the priority order between EV and HESS during charge and discharge, and ensures that the EV battery state of energy at the departure time is sufficient for its travel distance. It also ensures that the EV and HESS are charged when electricity prices are low and discharged in peak hours to reduce net electricity expenditure. The proposed strategy operates in different modes to control the energy amount flowing from the grid to EV and/or HESS and the energy amount drawn from the HESS and/or EV to feed the demand to maintain the load curve level within the average limits of the daily load curve. Four different scenarios are presented to investigate the role of HESS and EV technology in reducing electricity bills and smoothing the load curve in the smart house. The results demonstrate that the proposed strategy effectively reduces electricity costs by 12%, 15%, 14%, and 17% in scenarios A, B, C, and D, respectively, and smooths the load profile. Transferring valley electricity by V2H can reduce the electricity costs better than HESS, whereas HESS is better than EV at flattening the load curve. Transferring valley electricity through both V2H and HESS gives better results in reducing electricity costs and smoothing the load curve than transferring valley electricity by HESS or V2H alone. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. Breast Cancer Detection and Prevention Using Machine Learning.
- Author
-
Khalid, Arslan, Mehmood, Arif, Alabrah, Amerah, Alkhamees, Bader Fahad, Amin, Farhan, AlSalman, Hussain, and Choi, Gyu Sang
- Subjects
MACHINE learning ,CANCER prevention ,BREAST cancer ,EARLY detection of cancer ,FEATURE selection - Abstract
Breast cancer is a common cause of female mortality in developing countries. Early detection and treatment are crucial for successful outcomes. Breast cancer develops from breast cells and is considered a leading cause of death in women. This disease is classified into two subtypes: invasive ductal carcinoma (IDC) and ductal carcinoma in situ (DCIS). The advancements in artificial intelligence (AI) and machine learning (ML) techniques have made it possible to develop more accurate and reliable models for diagnosing and treating this disease. From the literature, it is evident that the incorporation of MRI and convolutional neural networks (CNNs) is helpful in breast cancer detection and prevention. In addition, the detection strategies have shown promise in identifying cancerous cells. The CNN Improvements for Breast Cancer Classification (CNNI-BCC) model helps doctors spot breast cancer using a trained deep learning neural network system to categorize breast cancer subtypes. However, they require significant computing power for imaging methods and preprocessing. Therefore, in this research, we proposed an efficient deep learning model that is capable of recognizing breast cancer in computerized mammograms of varying densities. Our research relied on three distinct modules for feature selection: the removal of low-variance features, univariate feature selection, and recursive feature elimination. The craniocaudally and medial-lateral views of mammograms are incorporated. We tested it with a large dataset of 3002 merged pictures gathered from 1501 individuals who had digital mammography performed between February 2007 and May 2015. In this paper, we applied six different categorization models for the diagnosis of breast cancer, including the random forest (RF), decision tree (DT), k-nearest neighbors (KNN), logistic regression (LR), support vector classifier (SVC), and linear support vector classifier (linear SVC). The simulation results prove that our proposed model is highly efficient, as it requires less computational power and is highly accurate. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
7. Accuracy of seizure semiology obtained from first-time seizure witnesses
- Author
-
Muayqil, Taim A., Alanazy, Mohammed H., Almalak, Hassan M., Alsalman, Hussain Khaled, Abdulfattah, Faroq Walid, Aldraihem, Abdullah Ibrahim, Al-hussain, Fawaz, and Aljafen, Bandar N.
- Published
- 2018
- Full Text
- View/download PDF
8. Efficient and Secure Key Management and Authentication Scheme for WBSNs Using CP-ABE and Consortium Blockchain.
- Author
-
Iqbal, Jawaid, Bibi, Hajira, Amin, Noor Ul, AlSalman, Hussain, Ullah, Syed Sajid, Hussain, Saddam, and Al-Aidroos, Naziha
- Subjects
BODY sensor networks ,BLOCKCHAINS ,MULTIPLE criteria decision making ,MEDICAL registries ,WIRELESS sensor networks ,INTERNET protocols ,ENERGY consumption - Abstract
Wireless body sensor networks (WBSNs) pose significant security and privacy risks. The Medical Server (MS) will only allow legitimate stakeholders access to confidential patient medical records when successful mutual authentication between all registered users and the MS has been confirmed using preset secret attributes. This paper proposes a novel approach to overcome the security and privacy problems in WBSNs by using CP-ABE and a consortium blockchain for key management and authentication. In this paper, a fixed-size session key is computed by utilizing several attribute base rules and AND/OR logic gate combinations. IEEE 802.15.6 is also used to transmit the encoded patient data from the register and legitimately deployed biosensor nodes on a patient's body to the Base Station nearby (BS). This was done in part by leveraging consortium blockchains to construct partial blocks and then, transmit the encrypted partial blocks to MS via peer-to-peer networks, as well as aggregating critical physiological information. MS is now validating partial blocks with a hash function to ensure their integrity before converting them all into full blocks, which are subsequently mined and put on the blockchain effectively and ideally using a consensus mechanism. When sessions between MS and stakeholders are established, all legitimate consumers can view the secure medical records of a registered patient in a hospital using their predefined access structure.. The resource-constrained environment of WBSNs can benefit from enhanced data security and privacy by using CP-ABE in conjunction with the organization's consensus to encrypt the patient's critical features or attributes. Automated Validation of Internet Security Protocol and Applications (AVISPA) tool is used to verify the validity and correctness of the proposed authentication mechanism. The proposed scheme reduces transmission, processing and storage costs and energy usage by a significant margin when compared to current state-of-the-art alternatives. It is also worth noting that a multicriteria decision making (MCDM) approach known as Evaluation Based on Distance from Average Solution (EDAS) is employed to provide the ranking and determine which strategy is optimal across all of the domains involved. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
9. Spatially composition-graded monolayer tungsten selenium telluride.
- Author
-
Xu, Kai, Hao, Zheng, Alsalman, Hussain, Kang, Junzhe, Chen, Changqiang, Wang, Zhiyu, Zhao, Zijing, Low, Tony, and Zhu, Wenjuan
- Subjects
SOLAR spectra ,CHEMICAL vapor deposition ,ATOMIC force microscopy ,ELECTRON affinity ,MONOMOLECULAR films ,TUNGSTEN ,SELENIUM - Abstract
Heterogeneous materials with spatially modulated bandgaps have many unique applications, such as super-broadband nanolasers, color engineered displays, hyperspectral detectors, and full spectrum solar cells. In this work, spatially composition-graded WSe
2 − 2x Te2x flakes are synthesized through an in situ chemical vapor deposition method. Furthermore, a monolayer flake topography is confirmed by atomic force microscopy. Photoluminescence and Raman line-scanning characterization indicate the bandgap changes continuously from center (1.46 eV) to edge (∼1.61 eV) within a monolayer flake. Electronic devices based on this spatially composition-graded material exhibit tunable transfer curves. First principal calculation reveals that the electron affinity increases, while the bandgap decreases based on tellurium composition. This is consistent with experimentally observed non-monotonic dependence of the hole current on tellurium composition. This work provides the experimental groundwork for synthesis of the composition-graded transition metal dichalcogenide materials and offers a route toward tailoring their electrical properties by bandgap engineering in the future. [ABSTRACT FROM AUTHOR]- Published
- 2022
- Full Text
- View/download PDF
10. An Effective Wireless Sensor Network Routing Protocol Based on Particle Swarm Optimization Algorithm.
- Author
-
Ghawy, Mohammed Zaid, Amran, Gehad Abdullah, AlSalman, Hussain, Ghaleb, Eissa, Khan, Javed, AL-Bakhrani, Ali A., Alziadi, Ahmed M., Ali, Abdulaziz, and Ullah, Syed Sajid
- Subjects
PARTICLE swarm optimization ,NETWORK routing protocols ,WIRELESS sensor networks ,MATHEMATICAL optimization ,END-to-end delay ,ARTIFICIAL intelligence - Abstract
Improving wireless communication and artificial intelligence technologies by using Internet of Things (Itoh) paradigm has been contributed in developing a wide range of different applications. However, the exponential growth of smart phones and Internet of Things (IoT) devices in wireless sensor networks (WSNs) is becoming an emerging challenge that adds some limitations on Quality of Service (QoS) requirements. End-to-end latency, energy consumption, and packet loss during transmission are the main QoS requirements that could be affected by increasing the number of IoT applications connected through WSNs. To address these limitations, an effective routing protocol needs to be designed for boosting the performance of WSNs and QoS metrics. In this paper, an optimization approach using Particle Swarm Optimization (PSO) algorithm is proposed to develop a multipath protocol, called a Particle Swarm Optimization Routing Protocol (MPSORP). The MPSORP is used for WSN-based IoT applications with a large volume of traffic loads and unfairness in network flow. For evaluating the developed protocol, an experiment is conducted using NS-2 simulator with different configurations and parameters. Furthermore, the performance of MPSORP is compared with AODV and DSDV routing protocols. The experimental results of this comparison demonstrated that the proposed approach achieves several advantages such as saving energy, low end-to-end delay, high packet delivery ratio, high throughput, and low normalization load. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
11. Arabic Document Classification: Performance Investigation of Preprocessing and Representation Techniques.
- Author
-
Muaad, Abdullah Y., Davanagere, Hanumanthappa Jayappa, Guru, D.S., Benifa, J.V. Bibal, Chola, Channabasava, AlSalman, Hussain, Gumaei, Abdu H., and Al-antari, Mugahed A.
- Subjects
FEATURE selection ,NATURAL language processing ,NAIVE Bayes classification ,ARTIFICIAL intelligence ,CLASSIFICATION algorithms ,FEATURE extraction - Abstract
With the increasing number of online social posts, review comments, and digital documentations, the Arabic text classification (ATC) task has been hugely required for many spontaneous natural language processing (NLP) applications, especially within the coronavirus pandemics. The variations in the meaning of the same Arabic words could directly affect the performance of any AI-based framework. This work aims to identify the effectiveness of machine learning (ML) algorithms through preprocessing and representation techniques. This effectiveness is measured via different AI-based classification techniques. Basically, the ATC process is influenced by several factors such as stemming in preprocessing, method of feature extraction and selection, nature of datasets, and classification algorithm. To improve the overall classification performance, preprocessing techniques are mainly used to convert each Arabic word into its root and decrease the representation dimension among the datasets. Feature extraction and selection always play crucial roles to represent the Arabic text in a meaningful way and improve the classification accuracy rate. The selected classifiers in this study are performed based on various feature selection algorithms. The overall classification evaluation results are compared using different classifiers such as multinomial Naive Bayes (MNB), Bernoulli Naive Bayes (BNB), Stochastic Gradient Descent (SGD), Support Vector Classifier (SVC), Logistic Regression (LR), and Linear SVC. All of these AI classifiers are evaluated using five balanced and unbalanced benchmark datasets: BBC Arabic corpus, CNN Arabic corpus, Open-Source Arabic corpus (OSAc), ArCovidVac, and AlKhaleej. The evaluation results show that the classification performance strongly depends on the preprocessing technique, representation methods and classification technique, and the nature of datasets used. For the considered benchmark datasets, the linear SVC has outperformed other classifiers overall when prominent features are selected. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
12. An Effective and Lightweight Deep Electrocardiography Arrhythmia Recognition Model Using Novel Special and Native Structural Regularization Techniques on Cardiac Signal.
- Author
-
Ullah, Hadaate, Bin Heyat, Md Belal, AlSalman, Hussain, Khan, Haider Mohammed, Akhtar, Faijan, Gumaei, Abdu, Mehdi, Aaman, Muaad, Abdullah Y., Islam, Md Sajjatul, Ali, Arif, Bu, Yuxiang, Khan, Dilpazir, Pan, Taisong, Gao, Min, Lin, Yuan, and Lai, Dakun
- Subjects
ARRHYTHMIA ,CONVOLUTIONAL neural networks ,ELECTROCARDIOGRAPHY ,HEART beat ,DEEP learning ,MEDICAL societies ,PHYSICIANS - Abstract
Recently, cardiac arrhythmia recognition from electrocardiography (ECG) with deep learning approaches is becoming popular in clinical diagnosis systems due to its good prognosis findings, where expert data preprocessing and feature engineering are not usually required. But a lightweight and effective deep model is highly demanded to face the challenges of deploying the model in real-life applications and diagnosis accurately. In this work, two effective and lightweight deep learning models named Deep-SR and Deep-NSR are proposed to recognize ECG beats, which are based on two-dimensional convolution neural networks (2D CNNs) while using different structural regularizations. First, 97720 ECG beats extracted from all records of a benchmark MIT-BIH arrhythmia dataset have been transformed into 2D RGB (red, green, and blue) images that act as the inputs to the proposed 2D CNN models. Then, the optimization of the proposed models is performed through the proper initialization of model layers, on-the-fly augmentation, regularization techniques, Adam optimizer, and weighted random sampler. Finally, the performance of the proposed models is evaluated by a stratified 5-fold cross-validation strategy along with callback features. The obtained overall accuracy of recognizing normal beat and three arrhythmias (V-ventricular ectopic, S-supraventricular ectopic, and F-fusion) based on the Association for the Advancement of Medical Instrumentation (AAMI) is 99.93%, and 99.96% for the proposed Deep-SR model and Deep-NSR model, which demonstrate that the effectiveness of the proposed models has surpassed the state-of-the-art models and also expresses the higher model generalization. The received results with model size suggest that the proposed CNN models especially Deep-NSR could be more useful in wearable devices such as medical vests, bracelets for long-term monitoring of cardiac conditions, and in telemedicine to accurate diagnose the arrhythmia from ECG automatically. As a result, medical costs of patients and work pressure on physicians in medicals and clinics would be reduced effectively. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
13. Graphical Analysis of q-Rung Orthopair Fuzzy Information with Application.
- Author
-
AlSalman, Hussain and Alkhamees, Bader Fahad
- Subjects
- *
POLITICAL campaigns , *FUZZY sets , *IDEA (Philosophy) , *FUZZY graphs , *BIPARTITE graphs - Abstract
The q-rung orthopair fuzzy graph (q-ROFG) is an expansion of the intuitionistic fuzzy graph (IFG) and Pythagorean fuzzy graph (PFG); q-rung orthopair fuzzy model is an influential model for describing vagueness and uncertainty as a comparison to an intuitionistic fuzzy model and Pythagorean fuzzy model. The research aims to illustrate the notion of the graph of q-rung orthopair fuzzy sets (q-ROFSs). Furthermore, in this article, we examine the ideas of domination theory (DT) and double domination theory (DDT) in q-ROFGs. Additionally, the structure of q-ROFG is developed and its associated concept is presented through the assistance of instructive instances. Furthermore, the DT of q-ROFGs is established, as are cardinality, power, and completeness on dominance in a q-ROFG and bipartite q-ROFG, and double domination set (DDS), as well as some results, is investigated in the concept of q-ROFGs. A political campaign is simulated using the proposed structure as an application, and the impact of double dominance (DD) on political campaigns is investigated. Finally, a comparison is given between the proposed study and actual studies, as well as the advantages of working in the q-ROFG scenario. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
14. Designing a Healthcare-Enabled Software-Defined Wireless Body Area Network Architecture for Secure Medical Data and Efficient Diagnosis.
- Author
-
Iqbal, Jawaid, Adnan, Muhammad, Khan, Younas, AlSalman, Hussain, Hussain, Saddam, Ullah, Syed Sajid, Amin, Noor ul, and Gumaei, Abdu
- Subjects
BODY area networks ,HEALTH facilities ,BODY temperature ,DIAGNOSIS ,WIRELESS channels ,VITAL signs ,HEART beat ,ENERGY consumption - Abstract
In the struggle against population aging, chronic diseases, and a lack of medical facilities, the emergence of Wireless Body Area Networks (WBANs) technology has ushered in optimism. WBANs use a variety of wearable and implanted biosensor nodes to constantly monitor physiological parameters such as oxygen saturation (SpO
2 ), electrocardiogram (ECG), electromyography (EMG), electroencephalogram (EEG), blood pressure, respiration rate, body temperature, and pulse rate. Importantly, these vital signs are communicated to a doctor over a public network, who can diagnose ailments remotely and efficiently. Among these communications, the security and privacy of patients are the prime concerns while transferring data over an open wireless channel from biosensor nodes to a Medical Server (MS) through a Base Station (BS) for efficient medical diagnosis. Finding an effective security strategy for patients which rely on WBANs to monitor their health information is a huge challenge due to the confined nature of the WBANs environment. To tackle the above challenges, in this research, a new, efficient, and secure healthcare-enabled software-defined WBANs architecture based on Schnorr signcryption and Hyperelliptic Curve Cryptography (HECC) is suggested in which the SDN technology is integrated into WBANs. By separating the control and data planes in an efferent manner, SDN technology allows you to control and manage the network in a programmable manner. The main features of SDN, such as its programmability, flexibility, and centralized control, make it a simple and scalable network. In this research, first, a Software-Defined Wireless Body Area Networks (SD-WBANs) architecture has been designed, and then a lightweight Schnorr signcryption with Hyperelliptic Curve Cryptography (HECC) has been proposed to preserve sensitive patient data security during transmission on public networks. Moreover, a well-known Multicriteria Decision-Making (MCDM) approach known as Evaluation Based on Distance from Average Solution (EDAS) is also used to demonstrate the success of the suggested system. According to the performance analysis, the suggested approach beats previous state-of-the-art techniques in terms of computation cost, communication overhead, storage cost, and energy usage. [ABSTRACT FROM AUTHOR]- Published
- 2022
- Full Text
- View/download PDF
15. A Decision-Making Framework Using q-Rung Orthopair Probabilistic Hesitant Fuzzy Rough Aggregation Information for the Drug Selection to Treat COVID-19.
- Author
-
Attaullah, Ashraf, Shahzaib, Rehman, Noor, AlSalman, Hussain, and Gumaei, Abdu H.
- Subjects
COVID-19 ,SARS-CoV-2 ,COVID-19 pandemic ,FUZZY sets ,DECISION making ,COVID-19 treatment - Abstract
In our current era, a new rapidly spreading pandemic disease called coronavirus disease (COVID-19), caused by a virus identified as a novel coronavirus (SARS-CoV-2), is becoming a crucial threat for the whole world. Currently, the number of patients infected by the virus is expanding exponentially, but there is no commercially available COVID-19 medication for this pandemic. However, numerous antiviral drugs are utilized for the treatment of the COVID-19 disease. Identification of the appropriate antivirus medicine to treat the infection of COVID-19 is still a complicated and uncertain decision. This study's key objective is to develop a novel approach called q-rung orthopair probabilistic hesitant fuzzy rough set (q-ROPHFRS), which incorporates the q-rung orthopair fuzzy set, probabilistic hesitant fuzzy set, and rough set structures. New q-ROPHFR aggregation operators have been established: the q-ROPHFR Einstein weighted averaging (q-ROPHFREWA) operator and the q-ROPHFR Einstein weighted geometric (q-ROPHFREWG) operator. In this study, we explored some basic features of the developed operators. Afterward, to demonstrate the viability and feasibility of the established decision-making approach in real-world applications, a case study related to selecting drugs for COVID-19 pandemic is addressed. Furthermore, a comprehensive comparison with the q-rung orthopair probabilistic hesitant fuzzy rough TOPSIS technique is also presented to illustrate the benefits of the new framework. The obtained results confirm the reliability and effectiveness of the proposed approach for finding uncertainty in real-world decision-making. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
16. An Effective Approach for Human Activity Classification Using Feature Fusion and Machine Learning Methods.
- Author
-
Ibrahim, Muhammad Junaid, Kainat, Jaweria, AlSalman, Hussain, Ullah, Syed Sajid, Al-Hadhrami, Suheer, and Hussain, Saddam
- Subjects
HUMAN activity recognition ,MACHINE learning ,MEDICAL informatics ,COMPUTER vision ,FEATURE selection ,FEATURE extraction - Abstract
Recent advances in image processing and machine learning methods have greatly enhanced the ability of object classification from images and videos in different applications. Classification of human activities is one of the emerging research areas in the field of computer vision. It can be used in several applications including medical informatics, surveillance, human computer interaction, and task monitoring. In the medical and healthcare field, the classification of patients' activities is important for providing the required information to doctors and physicians for medication reactions and diagnosis. Nowadays, some research approaches to recognize human activity from videos and images have been proposed using machine learning (ML) and soft computational algorithms. However, advanced computer vision methods are still considered promising development directions for developing human activity classification approach from a sequence of video frames. This paper proposes an effective automated approach using feature fusion and ML methods. It consists of five steps, which are the preprocessing, feature extraction, feature selection, feature fusion, and classification steps. Two available public benchmark datasets are utilized to train, validate, and test ML classifiers of the developed approach. The experimental results of this research work show that the accuracies achieved are 99.5% and 99.9% on the first and second datasets, respectively. Compared with many existing related approaches, the proposed approach attained high performance results in terms of sensitivity, accuracy, precision, and specificity evaluation metric. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
17. Novel Decision-Making Techniques in Tripolar Fuzzy Environment with Application: A Case Study of ERP Systems.
- Author
-
Afridi, Minhaj, Gumaei, Abdu H., AlSalman, Hussain, Khan, Asghar, and Mizanur Rahman, Sk. Md.
- Subjects
AGGREGATION operators ,ENTERPRISE resource planning ,FUZZY sets ,DECISION making ,HESITATION - Abstract
The intuitionistic fuzzy set (IFS) and bipolar fuzzy set (BFS) are all effective models to describe ambiguous and incomplete cognitive knowledge with membership, non-membership, negative membership, and hesitancy sections. But in daily life problems, there are some situations where we cannot apply the ordinary models of IFS and BFS, separately. Hence, there is a need to combine both the models of IFS and BFS into a single one. A tripolar fuzzy set (TFS) is a generalization of IFS and BFS. In circumstances where BFS and IFS models cannot be used individually, a tripolar fuzzy model is more dependable and efficient. Further, the IFS and BFS models are reduced to corollaries due to the proposed model of TFS. For this purpose in this article, we first consider some novel operations on tripolar fuzzy information. These operations are formulated on the basis of well-known Dombi T-norm and T-conorm, and the desirable properties are discussed. By applying the Dombi operations, arithmetic and geometric aggregation operators of TFS are proposed, and we introduce the concepts of a TF-Dombi weighted average (TFDWA) operator, a TF-Dombi ordered weighted average (TFDOWA) operator, and a TF-Dombi hybrid weighted (TFDHW) operator and explore their fundamental features including idempotency, boundedness, monotonicity, and others. In the second part, we propose TF-Dombi weighted geometric (TFDWG) operator, TF-Dombi ordered weighted geometric (TFDOWG) operator, and TF-Dombi hybrid geometric (TFDHG) operator. The features and specific cases of the mentioned operators are examined. Enterprise resource planning (ERP) is a management and integration approach that organizations employ to manage and develop many aspects of their operations. The study's primary contribution is to employ TFS to create certain decision-making strategies for the selection of optimal ERP systems. The proposed operators are then used to build several techniques for solving multiattribute decision-making (MADM) issues with TF information. Finally, an example of ERP system selection is investigated to demonstrate that the techniques suggested are trustworthy and realistic. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
18. A Machine Learning-Based Intelligence Approach for Multiple-Input/Multiple-Output Routing in Wireless Sensor Networks.
- Author
-
Sridhar, V., Ranga Rao, K. V., Vinay Kumar, V., Mukred, Muaadh, Ullah, Syed Sajid, and AlSalman, Hussain
- Subjects
ARTIFICIAL intelligence ,DATA transmission systems ,DATA packeting ,COMPUTATIONAL intelligence ,WIRELESS sensor networks ,MACHINE learning ,KEY performance indicators (Management) ,ENERGY consumption - Abstract
Computational intelligence methods play an important role for supporting smart networks operations, optimization, and management. In wireless sensor networks (WSNs), increasing the number of nodes has a need for transferring large volume of data to remote nodes without any loss. These large amounts of data transmission might lead to exceeding the capacity of WSNs, which results in congestion, latency, and packet loss. Congestion in WSNs not only results in information loss but also burns a significant amount of energy. To tackle this issue, a practical computational intelligence approach for optimizing data transmission while decreasing latency is necessary. In this article, a Softmax-Regressed-Tanimoto-Reweight-Boost-Classification- (SRTRBC-) based machine learning technique is proposed for effective routing in WSNs. It can route packets around busy locations by selecting nodes with higher energy and lower load. The proposed SRTRBC technique is composed of two steps: route path construction and congestion-aware MIMO routing. Prior to constructing the route path, the residual energy of the node is determined. After that, the residual energy level is analyzed using softmax regression to determine whether or not the node is energy efficient. The energy-efficient nodes are located, and numerous paths between the source and sink nodes are established using route request and route reply. Following that, the SRTRBC technique is used for congestion-aware routing based on buffer space and bandwidth capability. The path that requires the least buffer space and has the highest bandwidth capacity is picked as the optimal route path among multiple paths. Finally, congestion-aware data transmission is used to minimize latency and data loss along the route path. The simulation considers a variety of performance metrics, including energy consumption, data delivery rate, data loss rate, throughput, and delay, in relation to the amount of data packets and sensor nodes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
19. Artificial Intelligence as a Service for Immoral Content Detection and Eradication.
- Author
-
Shah, Fadia, Anwar, Aamir, ul haq, Ijaz, AlSalman, Hussain, Hussain, Saddam, and Al-Hadhrami, Suheer
- Subjects
ARTIFICIAL intelligence ,INTELLIGENCE service ,SOFTWARE as a service ,SUPPORT vector machines ,ACTIVE medium ,CLOUD computing ,SOCIAL media - Abstract
Social media is referred to as active global media because of its seamless binding thanks to COVID-19. Connecting software such as Facebook, Twitter, WhatsApp, WeChat, and others come with a variety of capabilities. They are well-known for their low-cost, quick, and effective communication. Because of the seclusion and travel constraints caused by COVID-19, concerns, such as low physical involvement in many possible activities, have arisen. Depending on their information, knowledge, nature, experience, and way of behavior, various types of human beings have diverse responses to any scenario. As the number of net subscribers grows, inappropriate material has become a major concern. The world's most prestigious and trustworthy organizations are keenly interested in conducting practical research in this field. The research contributes to using Artificial Intelligence (AI) as a service (AIaaS) for preventing the spread of immoral content. As software as a service (SaaS) and infrastructure as a service (IaaS), AIaaS for immoral content detection and eradication can use effective cloud computing models to leverage this service. It is highly adaptable and dynamic. AIaaS-based immoral content detection is mostly effective for optimizing the outcomes based on big data training data samples. Immoral content is identified for semantic and sentiment evaluation, and content is divided into immoral, cyberbullying, and dislike components. The suggested paper's main issue is the polarity of immoral content that can be processed using an AI-based optimization approach to control content proliferation. To finish the class and statistical analysis, support vector machine (SVM), selection tree, and Naive Bayes classifiers are employed. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
20. A Liquid Democracy Enabled Blockchain-Based Electronic Voting System.
- Author
-
Anwar ul Hassan, Ch, Hammad, Muhammad, Iqbal, Jawaid, Hussain, Saddam, Ullah, Syed Sajid, AlSalman, Hussain, Mosleh, Mogeeb A. A., and Arif, Muhammad
- Subjects
BLOCKCHAINS ,ELECTRONIC voting ,ELECTRONIC systems - Abstract
Developing an electronic voting system that meets the practical needs of administrators has been a difficult task for a long time. Now, blockchain technologies solve this problem by providing a distributed ledger with immutable, encrypted, and secure transactions. Distributed ledger technologies are an interesting technological leap in the field of data innovation, transparency, and trustability. In public blockchain, distributed ledger technology is widely used. The blockchain technology can be used in an almost infinite number of ways to benefit from sharing economies. The purpose of this study is to assess how blockchain may be utilized to build electronic voting systems that can be used as a service. The purpose of electronic voting systems is explained in this article, as are the technological and legal limitations of employing blockchain as a service. Then, using blockchain as a foundation, we propose a new electronic voting system that fixes the flaws we observed. In general, this paper evaluates the capabilities of distributed ledger technologies by depicting a contextual investigation in order to fine-tune the process of political election decisions and employing a blockchain-based application that improves security and lowers the cost of conducting nationwide elections. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
21. Complex pythagorean fuzzy aggregation operators based on confidence levels and their applications.
- Author
-
Mahmood, Tahir, Ali, Zeeshan, Ullah, Kifayat, Khan, Qaisar, AlSalman, Hussain, Gumaei, Abdu, and Rahman, Sk. Md. Mizanur
- Published
- 2022
- Full Text
- View/download PDF
22. Analysis of medical diagnosis based on variation co-efficient similarity measures under picture hesitant fuzzy sets and their application.
- Author
-
Ali, Zeeshan, Mahmood, Tahir, AlSalman, Hussain, Alkhamees, Bader Fahad, and Rahman, Sk. Md. Mizanur
- Published
- 2022
- Full Text
- View/download PDF
23. Group Generalized q-Rung Orthopair Fuzzy Soft Sets: New Aggregation Operators and Their Applications.
- Author
-
Hayat, Khizar, Shamim, Raja Aqib, AlSalman, Hussain, Gumaei, Abdu, Yang, Xiao-Peng, and Azeem Akbar, Muhammad
- Subjects
AGGREGATION operators ,SOFT sets ,FUZZY mathematics ,FUZZY sets - Abstract
In recent years, q-rung orthopair fuzzy sets have been appeared to deal with an increase in the value of q > 1 , which allows obtaining membership and nonmembership grades from a larger area. Practically, it covers those membership and nonmembership grades, which are not in the range of intuitionistic fuzzy sets. The hybrid form of q-rung orthopair fuzzy sets with soft sets have emerged as a useful framework in fuzzy mathematics and decision-makings. In this paper, we presented group generalized q-rung orthopair fuzzy soft sets (GGq-ROFSSs) by using the combination of q-rung orthopair fuzzy soft sets and q-rung orthopair fuzzy sets. We investigated some basic operations on GGq-ROFSSs. Notably, we initiated new averaging and geometric aggregation operators on GGq-ROFSSs and investigated their underlying properties. A multicriteria decision-making (MCDM) framework is presented and validated through a numerical example. Finally, we showed the interconnection of our methodology with other existing methods. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
24. An Efficient Cancer Classification Model Using Microarray and High-Dimensional Data.
- Author
-
Fathi, Hanaa, AlSalman, Hussain, Gumaei, Abdu, Manhrawy, Ibrahim I. M., Hussien, Abdelazim G., and El-Kafrawy, Passent
- Subjects
- *
TUMOR classification , *CANCER prognosis , *PEARSON correlation (Statistics) , *GENE expression , *DECISION trees , *CAUSES of death - Abstract
Cancer can be considered as one of the leading causes of death widely. One of the most effective tools to be able to handle cancer diagnosis, prognosis, and treatment is by using expression profiling technique which is based on microarray gene. For each data point (sample), gene data expression usually receives tens of thousands of genes. As a result, this data is large-scale, high-dimensional, and highly redundant. The classification of gene expression profiles is considered to be a (NP)-Hard problem. Feature (gene) selection is one of the most effective methods to handle this problem. A hybrid cancer classification approach is presented in this paper, and several machine learning techniques were used in the hybrid model: Pearson's correlation coefficient as a correlation-based feature selector and reducer, a Decision Tree classifier that is easy to interpret and does not require a parameter, and Grid Search CV (cross-validation) to optimize the maximum depth hyperparameter. Seven standard microarray cancer datasets are used to evaluate our model. To identify which features are the most informative and relative using the proposed model, various performance measurements are employed, including classification accuracy, specificity, sensitivity, F1-score, and AUC. The suggested strategy greatly decreases the number of genes required for classification, selects the most informative features, and increases classification accuracy, according to the results. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
25. Transition Metal-Free Half-Metallicity in Two-Dimensional Gallium Nitride with a Quasi-Flat Band.
- Author
-
Lee, Seungjun, Alsalman, Hussain, Jiang, Wei, Low, Tony, and Kwon, Young-Kyun
- Published
- 2021
- Full Text
- View/download PDF
26. A Computational Intelligence Approach for Predicting Medical Insurance Cost.
- Author
-
ul Hassan, Ch. Anwar, Iqbal, Jawaid, Hussain, Saddam, AlSalman, Hussain, Mosleh, Mogeeb A. A., and Sajid Ullah, Syed
- Subjects
HEALTH insurance ,INSURANCE costs ,MEDICAL care costs ,COMPUTATIONAL mathematics ,COMPUTATIONAL intelligence ,SOFT computing - Abstract
In the domains of computational and applied mathematics, soft computing, fuzzy logic, and machine learning (ML) are well-known research areas. ML is one of the computational intelligence aspects that may address diverse difficulties in a wide range of applications and systems when it comes to exploitation of historical data. Predicting medical insurance costs using ML approaches is still a problem in the healthcare industry that requires investigation and improvement. Using a series of machine learning algorithms, this study provides a computational intelligence approach for predicting healthcare insurance costs. The proposed research approach uses Linear Regression, Support Vector Regression, Ridge Regressor, Stochastic Gradient Boosting, XGBoost, Decision Tree, Random Forest Regressor, Multiple Linear Regression, and k-Nearest Neighbors A medical insurance cost dataset is acquired from the KAGGLE repository for this purpose, and machine learning methods are used to show how different regression models can forecast insurance costs and to compare the models' accuracy. The results shows that the Stochastic Gradient Boosting (SGB) model outperforms the others with a cross-validation value of 0.0.858 and RMSE value of 0.340 and gives 86% accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
27. Levenberg–Marquardt Backpropagation for Numerical Treatment of Micropolar Flow in a Porous Channel with Mass Injection.
- Author
-
Ullah, Hakeem, Khan, Imran, AlSalman, Hussain, Islam, Saeed, Asif Zahoor Raja, Muhammad, Shoaib, Muhammad, Gumaei, Abdu, Fiza, Mehreen, Ullah, Kashif, Mizanur Rahman, Sk. Md., and Ayaz, Muhammad
- Subjects
CHANNEL flow ,ARTIFICIAL neural networks ,NONLINEAR equations - Abstract
In this research work, an effective Levenberg–Marquardt algorithm-based artificial neural network (LMA-BANN) model is presented to find an accurate series solution for micropolar flow in a porous channel with mass injection (MPFPCMI). The LMA is one of the fastest backpropagation methods used for solving least-squares of nonlinear problems. We create a dataset to train, test, and validate the LMA-BANN model regarding the solution obtained by optimal homotopy asymptotic (OHA) method. The proposed model is evaluated by conducting experiments on a dataset acquired from the OHA method. The experimental results are obtained by using mean square error (MSE) and absolute error (AE) metric functions. The learning process of the adjustable parameters is conducted with efficacy of the LMA-BANN model. The performance of the developed LMA-BANN for the modelled problem is confirmed by achieving the best promise numerical results of performance in the range of E-05 to E-08 and also assessed by error histogram plot (EHP) and regression plot (RP) measures. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
28. Intelligent Malaysian Sign Language Translation System Using Convolutional-Based Attention Module with Residual Network.
- Author
-
Khan, Rehman Ullah, Khattak, Hizbullah, Wong, Woei Sheng, AlSalman, Hussain, Mosleh, Mogeeb A. A., and Mizanur Rahman, Sk. Md.
- Subjects
SIGN language ,TRANSLATING & interpreting ,PROBLEM solving ,CONVOLUTIONAL neural networks ,HIDDEN Markov models - Abstract
The deaf-mutes population always feels helpless when they are not understood by others and vice versa. This is a big humanitarian problem and needs localised solution. To solve this problem, this study implements a convolutional neural network (CNN), convolutional-based attention module (CBAM) to recognise Malaysian Sign Language (MSL) from images. Two different experiments were conducted for MSL signs, using CBAM-2DResNet (2-Dimensional Residual Network) implementing "Within Blocks" and "Before Classifier" methods. Various metrics such as the accuracy, loss, precision, recall, F1-score, confusion matrix, and training time are recorded to evaluate the models' efficiency. The experimental results showed that CBAM-ResNet models achieved a good performance in MSL signs recognition tasks, with accuracy rates of over 90% through a little of variations. The CBAM-ResNet "Before Classifier" models are more efficient than "Within Blocks" CBAM-ResNet models. Thus, the best trained model of CBAM-2DResNet is chosen to develop a real-time sign recognition system for translating from sign language to text and from text to sign language in an easy way of communication between deaf-mutes and other people. All experiment results indicated that the "Before Classifier" of CBAMResNet models is more efficient in recognising MSL and it is worth for future research. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
29. Fractional Analysis of MHD Boundary Layer Flow over a Stretching Sheet in Porous Medium: A New Stochastic Method.
- Author
-
Khan, Imran, Ullah, Hakeem, AlSalman, Hussain, Fiza, Mehreen, Islam, Saeed, Shoaib, Muhammad, Raja, Muhammad Asif Zahoor, Gumaei, Abdu, and Ikhlaq, Farkhanda
- Subjects
BOUNDARY layer (Aerodynamics) ,POROUS materials ,STAGNATION flow ,ARTIFICIAL neural networks ,MAGNETOHYDRODYNAMICS ,REGRESSION analysis - Abstract
In this article, an effective computing approach is presented by exploiting the power of Levenberg-Marquardt scheme (LMS) in a backpropagation learning task of artificial neural network (ANN). It is proposed for solving the magnetohydrodynamics (MHD) fractional flow of boundary layer over a porous stretching sheet (MHDFF BLPSS) problem. A dataset obtained by the fractional optimal homotopy asymptotic (FOHA) method is created as a simulated data simple for training (TR), validation (VD), and testing (TS) the proposed approach. The experiments are conducted by computing the results of mean-square-error (MSE), regression analysis (RA), absolute error (AE), and histogram error (HE) measures on the created dataset of FOHA solution. During the learning task, the parameters of trained model are adjusted by the efficacy of ANN backpropagation with the LMS (ANN-BLMS) approach. The ANN-BLMS performance of the modeled problem is verified by attaining the best convergence and attractive numerical results of evaluation measures. The experimental results show that the approach is effective for finding a solution of MHDFF BLPSS problem. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
30. Temporal Bone Adenoma: A Comprehensive Analysis of Clinical Aspects and Surgical Outcome on a Very Rare Entity.
- Author
-
Alsalman, Hussain, Crowther, John A., McLellan, Douglas, and Kontorinis, Georgios
- Subjects
- *
MAGNETIC resonance imaging , *COMPUTED tomography , *MIDDLE ear , *TEMPORAL bone , *DIAGNOSIS , *SYMPTOMS , *SENSORINEURAL hearing loss - Abstract
Objective The aim of this study is to present our experience in dealing with middle ear adenomas (MEAs), very rare tumors of the middle ear. Methods The medical notes of individuals with MEAs treated in tertiary referral; academic settings were retrospectively reviewed. We recorded the presenting symptoms, imaging findings, and pathology results. We additionally examined our surgical outcomes, follow-up period, recurrence, and morbidity. Results We identified four patients with MEAs: two males and two females with an average age of 36.25 years (range = 27–51 years). Despite the detailed imaging studies, including computed tomography and magnetic resonance imaging with intravenous contrast administration, a biopsy was essential in setting the diagnosis. Total surgical resection was achieved in all patients without any recurrence over an average of 6 years (range = 3–10 years). Complete ipsilateral deafness was the commonest surgical morbidity due to footplate infiltration by the tumor. Conclusion Total surgical resection is the treatment of choice in MEAs to minimize the risk for recurrence; this can come with morbidity, mostly sensorineural deafness. Given the very limited literature, long-term follow-up is recommended. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
31. q-Rung Orthopair Fuzzy Rough Einstein Aggregation Information-Based EDAS Method: Applications in Robotic Agrifarming.
- Author
-
Ashraf, Shahzaib, Rehman, Noor, Hussain, Azmat, AlSalman, Hussain, and Gumaei, Abdu H.
- Subjects
GROUP decision making ,AGGREGATION operators ,ROUGH sets ,ALGORITHMS ,FUZZY measure theory ,FUZZY sets ,ROBOTICS - Abstract
The main purpose of this manuscript is to present a novel idea on the q-rung orthopair fuzzy rough set (q-ROFRS) by the hybridized notion of q-ROFRSs and rough sets (RSs) and discuss its basic operations. Furthermore, by utilizing the developed concept, a list of q-ROFR Einstein weighted averaging and geometric aggregation operators are presented which are based on algebraic and Einstein norms. Similarly, some interesting characteristics of these operators are initiated. Moreover, the concept of the entropy and distance measures is presented to utilize the decision makers' unknown weights as well as attributes' weight information. The EDAS (evaluation based on distance from average solution) methodology plays a crucial role in decision-making challenges, especially when the problems of multicriteria group decision-making (MCGDM) include more competing criteria. The core of this study is to develop a decision-making algorithm based on the entropy measure, aggregation information, and EDAS methodology to handle the uncertainty in real-word decision-making problems (DMPs) under q-rung orthopair fuzzy rough information. To show the superiority and applicability of the developed technique, a numerical case study of a real-life DMP in agriculture farming is considered. Findings indicate that the suggested decision-making model is much more efficient and reliable to tackle uncertain information based on q-ROFR information. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
32. Fixed Point of Rational Contractions and Its Application for Secure Dynamic Routing in Wireless Sensor Networks.
- Author
-
Asif, Awais, Savas, Ekrem, AlSalman, Hussain, Arshad, Muahammad, Gumaei, Abdu, and Rehman, Abdul
- Subjects
WIRELESS sensor networks ,INFORMATION resources management ,DATA security ,FUNCTIONAL equations ,WIRELESS communications ,ROUTING algorithms ,DATA transmission systems - Abstract
Security is one of the major concerns for data communication over wireless sensor networks (WSNs). Dynamic routing algorithms can provide small similarity paths of data delivery between two consecutive transmitted packets, improving data security without adding extra information or control messages. This article illustrates the iteration of the fixed point (FP) of rational contractions and generalized Banach contractions (BC) in the setting of F-metric space (F-MS). It also describes an FP of the said mappings, while restricting the imposition of the contraction only to a subset of the F-MS, the closed ball, rather than executing it on the entire F-MS. The results have been verified and supported by concise examples. Further, the application of the functional equation proved results with randomization is given to find a solution for secure dynamic routing of data transmission in WSNs. The application is a tool to analyze and model a network structure in which sensors can be deployed with high security and low risk in a greater region (sensor field), thus boosting the accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
33. Falkner–Skan Equation with Heat Transfer: A New Stochastic Numerical Approach.
- Author
-
Khan, Imran, Ullah, Hakeem, AlSalman, Hussain, Fiza, Mehreen, Islam, Saeed, Zahoor Raja, Asif, Shoaib, Mohammad, and Gumaei, Abdu H.
- Subjects
HEAT equation ,THERMAL boundary layer ,HEAT transfer ,FEEDFORWARD neural networks ,ORDINARY differential equations - Abstract
In this study, a new computing model is developed using the strength of feedforward neural networks with the Levenberg–Marquardt method- (NN-BLMM-) based backpropagation technique. It is used to find a solution for the nonlinear system obtained from the governing equations of Falkner–Skan with heat transfer (FSE-HT). Moreover, the partial differential equations (PDEs) for the unsteady squeezing flow of heat and mass transfer of the viscous fluid are converted into ordinary differential equations (ODEs) with the help of similarity transformation. A dataset for the proposed NN-BLMM-based model is generated in different scenarios by a variation of various embedding parameters, Deborah number (β) and Prandtl number (Pr). The training (TR), testing (TS), and validation (VD) of the NN-BLMM model are evaluated in the generated scenarios to compare the obtained results with the reference results. For the fluidic system convergence analysis, a number of metrics such as the mean square error (MSE), error histogram (EH), and regression (RG) plots are utilized for measuring the effectiveness and performance of the NN-BLMM infrastructure model. The experiments showed that comparisons between the results of the proposed model and the reference results match in terms of convergence up to E-05 to E-10. This proves the validity of the NN-BLMM model. Furthermore, the results demonstrated that there is an increase in the velocity profile and a decrease in the thickness of the thermal boundary layer by increasing the Deborah number. Also, the thickness of the thermal boundary layer is decreased by increasing the Prandtl number. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
34. Self-heating controlled current–voltage and noise characteristics in graphene.
- Author
-
Ardaravičius, Linas, Kiprijanovič, Oleg, Alsalman, Hussain, and Kwak, Joon Young
- Subjects
CURRENT-voltage characteristics ,GRAPHENE ,ELECTRIC fields ,PHONONS ,OCHRATOXINS - Abstract
Pulsed current–voltage characteristics have been measured for epitaxial SiC graphene under controlled lattice temperature conditions. The monolayer and AB stacked bilayer graphene is dry transferred on SiO
2 . The measured characteristics of two-terminal samples with coplanar electrodes demonstrate non-ohmic behaviour up to intermediate-high fields. At high currents thermal effects come into play and soft damage of the samples takes place. Bilayer graphene samples withstand 20 kV cm−1 electric field when few nanosecond voltages pulses are applied. The results are treated in terms of hole drift velocity estimated from the data on current under the assumption of uniform electric field and constant hole density. The highest velocity of ∼3.5–5 × 106 cm s−1 (∼1.5 × 107 cm s−1 ) is estimated for the bilayer (monolayer) graphene. The velocity results are interpreted with hot phonons. High frequency noise is measured at 10 GHz for the monolayer graphene and the associated shot noise is resolved. [ABSTRACT FROM AUTHOR]- Published
- 2021
- Full Text
- View/download PDF
35. Prediction of COVID-19 Confirmed Cases Using Gradient Boosting Regression Method.
- Author
-
Gumaei, Abdu, Al-Rakhami, Mabrook, Al Rahhal, Mohamad Mahmoud, Albogamy, Fahad Raddah H., Al Maghayreh, Eslam, and AlSalman, Hussain
- Subjects
COVID-19 ,FORECASTING ,STANDARD deviations - Abstract
The fast spread of coronavirus disease (COVID-19) caused by SARSCoV- 2 has become a pandemic and a serious threat to the world. As of May 30, 2020, this disease had infected more than 6 million people globally, with hundreds of thousands of deaths. Therefore, there is an urgent need to predict confirmed cases so as to analyze the impact of COVID-19 and practice readiness in healthcare systems. This study uses gradient boosting regression (GBR) to build a trained model to predict the daily total confirmed cases of COVID-19. The GBR method can minimize the loss function of the training process and create a single strong learner from weak learners. Experiments are conducted on a dataset of daily confirmed COVID-19 cases from January 22, 2020, to May 30, 2020. The results are evaluated on a set of evaluation performance measures using 10-fold cross-validation to demonstrate the effectiveness of the GBR method. The results reveal that the GBR model achieves 0.00686 root mean square error, the lowest among several comparative models. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
36. Feature selection with ensemble learning for prostate cancer diagnosis from microarray gene expression.
- Author
-
Gumaei, Abdu, Sammouda, Rachid, Al-Rakhami, Mabrook, AlSalman, Hussain, and El-Zaart, Ali
- Subjects
RESEARCH methodology ,MATHEMATICAL models ,MICROARRAY technology ,MACHINE learning ,GENE expression ,THEORY ,PROSTATE tumors - Abstract
Cancer diagnosis using machine learning algorithms is one of the main topics of research in computer-based medical science. Prostate cancer is considered one of the reasons that are leading to deaths worldwide. Data analysis of gene expression from microarray using machine learning and soft computing algorithms is a useful tool for detecting prostate cancer in medical diagnosis. Even though traditional machine learning methods have been successfully applied for detecting prostate cancer, the large number of attributes with a small sample size of microarray data is still a challenge that limits their ability for effective medical diagnosis. Selecting a subset of relevant features from all features and choosing an appropriate machine learning method can exploit the information of microarray data to improve the accuracy rate of detection. In this paper, we propose to use a correlation feature selection (CFS) method with random committee (RC) ensemble learning to detect prostate cancer from microarray data of gene expression. A set of experiments are conducted on a public benchmark dataset using 10-fold cross-validation technique to evaluate the proposed approach. The experimental results revealed that the proposed approach attains 95.098% accuracy, which is higher than related work methods on the same dataset. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
37. DL-HAR: Deep Learning-Based Human Activity Recognition Framework for Edge Computing.
- Author
-
Gumaei, Abdu, Al-Rakhami, Mabrook, AlSalman, Hussain, Rahman, Sk. Md. Mizanur, and Alamri, Atif
- Subjects
HUMAN activity recognition ,DEEP learning ,EDGES (Geometry) ,INTERNET of things ,RECURRENT neural networks - Abstract
Human activity recognition is commonly used in several Internet of Things applications to recognize different contexts and respond to them. Deep learning has gained momentum for identifying activities through sensors, smartphones or even surveillance cameras. However, it is often difficult to train deep learning models on constrained IoT devices. The focus of this paper is to propose an alternative model by constructing a Deep Learning-based Human Activity Recognition framework for edge computing, which we call DL-HAR. The goal of this framework is to exploit the capabilities of cloud computing to train a deep learning model and deploy it on lesspowerful edge devices for recognition. The idea is to conduct the training of the model in the Cloud and distribute it to the edge nodes. We demonstrate how the DL-HAR can perform human activity recognition at the edge while improving efficiency and accuracy. In order to evaluate the proposed framework, we conducted a comprehensive set of experiments to validate the applicability of DL-HAR. Experimental results on the benchmark dataset show a significant increase in performance compared with the stateof- the-art models. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
38. Controlled p-type substitutional doping in large-area monolayer WSe2 crystals grown by chemical vapor deposition.
- Author
-
Pandey, Sushil Kumar, Alsalman, Hussain, Azadani, Javad G., Izquierdo, Nezhueyotl, Low, Tony, and Campbell, Stephen A.
- Published
- 2018
- Full Text
- View/download PDF
39. Long wavelength optical response of graphene-MoS2 heterojunction.
- Author
-
Joon Young Kwak, Jeonghyun Hwang, Calderon, Brian, Alsalman, Hussain, and Spencer, Michael G.
- Subjects
HETEROJUNCTIONS ,MOLYBDENUM sulfides ,SAPPHIRES ,GRAPHENE synthesis ,PHOTOTHERMAL spectroscopy - Abstract
The optical response of graphene-MoS
2 heterojunctions is investigated. Spatial resolution photoresponse maps obtained using multiple bias conditions are measured and analyzed by exciting the graphene-MoS2 heterojunction area, MoS2 , and Ti-MoS2 junction on the same device with an 800 nm wavelength Ti-Sapphire raster scanning laser. It is found that a large photothermal electric (PTE) effect is the dominant mechanism for photoresponse in a graphene-MoS2 heterojunction. Responsivities of 0.139 mA/W and 0.019 mA/W on the graphene-MoS2 heterojunction area and 0.457 mA/W and 0.032mA/W on the Ti-MoS2 junction area are observed with and without a bias, respectively, using a 430 lW laser. Current enhancement due to laser illumination is observed as far as 14 µm from the edge of the graphene-MoS2 heterojunction. Voltage generated by the PTE effect lowers the Schottky barrier junction, enabling more current flow during laser excitation. Photothermal-generated voltages of 0.22-0.47mV and 31.8-37.9mV are estimated at the graphene-MoS2 heterojunction and the Ti-MoS2 junction, respectively. [ABSTRACT FROM AUTHOR]- Published
- 2016
- Full Text
- View/download PDF
40. Electrical Characteristics of Multilayer MoS2FET’s with MoS2/Graphene Heterojunction Contacts.
- Author
-
Kwak, Joon Young, Hwang, Jeonghyun, Calderon, Brian, Alsalman, Hussain, Munoz, Nini, Schutter, Brian, and Spencer, Michael G.
- Published
- 2014
- Full Text
- View/download PDF
41. GPS Trajectory Completion Using End-to-End Bidirectional Convolutional Recurrent Encoder-Decoder Architecture with Attention Mechanism.
- Author
-
Nawaz, Asif, Huang, Zhiqiu, Wang, Senzhang, Akbar, Azeem, AlSalman, Hussain, and Gumaei, Abdu
- Subjects
UBIQUITOUS computing ,COMPUTER systems ,CITIES & towns ,DEEP learning ,MACHINE learning ,BIG data - Abstract
GPS datasets in the big data regime provide rich contextual information that enable efficient implementation of advanced features such as navigation, tracking, and security in urban computing systems. Understanding the hidden patterns in large amount of GPS data is critically important in ubiquitous computing. The quality of GPS data is the fundamental key problem to produce high quality results. In real world applications, certain GPS trajectories are sparse and incomplete; this increases the complexity of inference algorithms. Few of existing studies have tried to address this problem using complicated algorithms that are based on conventional heuristics; this requires extensive domain knowledge of underlying applications. Our contribution in this paper are two-fold. First, we proposed deep learning based bidirectional convolutional recurrent encoder-decoder architecture to generate the missing points of GPS trajectories over occupancy grid-map. Second, we interfaced attention mechanism between enconder and decoder, that further enhance the performance of our model. We have performed the experiments on widely used Microsoft geolife trajectory dataset, and perform the experiments over multiple level of grid resolutions and multiple lengths of missing GPS segments. Our proposed model achieved better results in terms of average displacement error as compared to the state-of-the-art benchmark methods. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
42. Bandgap engineering of two-dimensional semiconductor materials.
- Author
-
Chaves, A., Azadani, J. G., Alsalman, Hussain, da Costa, D. R., Frisenda, R., Chaves, A. J., Song, Seung Hyun, Kim, Y. D., He, Daowei, Zhou, Jiadong, Castellanos-Gomez, A., Peeters, F. M., Liu, Zheng, Hinkle, C. L., Oh, Sang-Hyun, Ye, Peide D., Koester, Steven J., Lee, Young Hee, Avouris, Ph., and Wang, Xinran
- Subjects
BAND gaps ,OPTOELECTRONICS ,GRAPHENE ,QUASIPARTICLES ,TWO-dimensional materials (Nanotechnology) - Abstract
Semiconductors are the basis of many vital technologies such as electronics, computing, communications, optoelectronics, and sensing. Modern semiconductor technology can trace its origins to the invention of the point contact transistor in 1947. This demonstration paved the way for the development of discrete and integrated semiconductor devices and circuits that has helped to build a modern society where semiconductors are ubiquitous components of everyday life. A key property that determines the semiconductor electrical and optical properties is the bandgap. Beyond graphene, recently discovered two-dimensional (2D) materials possess semiconducting bandgaps ranging from the terahertz and mid-infrared in bilayer graphene and black phosphorus, visible in transition metal dichalcogenides, to the ultraviolet in hexagonal boron nitride. In particular, these 2D materials were demonstrated to exhibit highly tunable bandgaps, achieved via the control of layers number, heterostructuring, strain engineering, chemical doping, alloying, intercalation, substrate engineering, as well as an external electric field. We provide a review of the basic physical principles of these various techniques on the engineering of quasi-particle and optical bandgaps, their bandgap tunability, potentials and limitations in practical realization in future 2D device technologies. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
43. Correction: Controlled p-type substitutional doping in large-area monolayer WSe2 crystals grown by chemical vapor deposition.
- Author
-
Pandey, Sushil Kumar, Alsalman, Hussain, Azadani, Javad G., Izquierdo, Nezhueyotl, Low, Tony, and Campbell, Stephen A.
- Published
- 2019
- Full Text
- View/download PDF
44. Photothermal electric effect of multilayer MoS2-graphene heterojunction.
- Author
-
Kwak, Joon Young, Hwang, Jeonghyun, Calderon, Brian, Alsalman, Hussain, Schutter, Brian, and Spencer, Michael G.
- Published
- 2015
- Full Text
- View/download PDF
45. A high response MoS2-graphene hetero-junction photodetector with broad spectral range.
- Author
-
Kwak, Joon Young, Hwang, Jeonghyun, Graham, Matthew, Alsalman, Hussain, Munoz, Nini, Calderon, Brian, Campbell, Dorr, and Spencer, Michael G.
- Published
- 2013
- Full Text
- View/download PDF
46. Public Awareness towards Renal Stone Causes, Symptoms and Management amongst Saudis.
- Author
-
Almuhanna, Ahmed Mousa, Alomar, Mohammad, Alsalman, Hussain Khaled, Al-Mutayliq, Abdulaziz Ahmed, and Alnasser, Khalid Abdulrahman
- Subjects
- *
KIDNEY stones diagnosis , *TREATMENT of calculi , *KIDNEY stone prevention , *KIDNEY stones , *ETIOLOGY of diseases , *DISEASE management , *PATIENTS - Abstract
Introduction: renal stone is an important health problem in the world and is the most common disease in urinary tract system. It is particularly a common problem in areas of hot climate like Saudi Arabia. Knowledge and lifestyle attitude of individuals towards renal stone plays a role in delivering optimum management. Aim: to determine the public awareness of renal stones causes, symptoms and management amongst Saudis. Patients and Methods: the data of this quantitative cross-sectional study was collected from participants from two regions in Saudi Arabia. Participants were given a self-administered questionnaire written in Arabic from October 2017 till November 2017. Individuals under the age of 18, tourists, medical staff and people unable to read Arabic were excluded. Data were analyzed using SPSS. Results: four hundred and seven participants with a mean age of 35 filled the questionnaire. About half of them had experienced renal stones either personally or in a direct family member. 91.4% of them are aware that increased water intake decreases the formation of renal stones. As for symptoms of urinary stones, 65.36% of them thought that pain and other urinary symptoms would occur when having urinary stones. Radiology imaging was the most chosen mode of diagnosing urinary tract stones especially amongst participants above the age of 35 (p-value= 0.002) with surgical intervention as the best treatment according to the participants. 57.2% of the participants believe that drinking parsley water prevents the formation of renal stones. Individuals who experienced renal stones before were more knowledgeable about the commonest type of renal stones (p-value= 0.005) and the quantity of recommended daily fluid intake (p-value= 0.008). Conclusion and Recommendation: this data indicates that the participants are to some degree aware of some aspects of renal stone prevention, symptoms and modes of diagnosis and treatment. Individuals who experienced renal stones were more knowledgeable in some aspects. Further emphasis on public awareness of renal stones is recommended. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
47. Awareness of Prostate Cancer, Screening and Methods of Managements in a Hospital in Riyadh, Saudi Arabia.
- Author
-
Mousa Almuhanna, Ahmed, Alshammari, Sulaiman, Khaled Alsalman, Hussain, Albeladi, Hassan, Alsubaie, Ali, Abueissa, Waleed A., Alkhawaja, Fatimah, and Ali Busaleh, Hussain
- Subjects
- *
MEDICAL screening , *DIAGNOSIS , *PROSTATE cancer , *EARLY detection of cancer , *PROSTATE cancer treatment , *PROSTATE cancer patients - Abstract
Background: screening for prostate cancer (PCa) is surrounded by controversies regarding the benefits, risks and uncertainties of undergoing the screening. Current practices of prostate cancer involve measuring the level of PSA and digital rectal examination. This study aimed to measure the knowledge and awareness of undergoing a prostate cancer screening and the available treatment options amongst the participants. Method: a questionnaire-based quantitative cross-sectional study which focuses on determining the knowledge of prostate cancer screening and management in a hospital in Riyadh. Results: three hundred and twenty-three participants filled the surveys (100% males), more than 80% of all ages had heard about prostate cancer and that it is a disease of the male. A higher level of education is significantly associated with the level of awareness (P-value <0.001). More educated participants selected 40 years old as the appropriate age for PCa screening (P-value 0.009) and radiotherapy as the mode of treatment (P-value 0.01). 43.34% saw PCa as a cause of death and 41.4% saw it associated with smoking. Only 17.84% undergo continuous PCa screening most of them in 50-60 age group with "reassurance" as the main motivator. 37.8% of the participants did not know the symptoms of PCa and around 25% selected pain in micturition, difficult frequent micturition and bone pain as symptoms of PCa. Conclusion: although prostate cancer is known amongst the majority of the participants, only a minority of them has knowledge of the symptoms and undergoes regular screening. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
48. Internet of Things with Deep Learning-Based Face Recognition Approach for Authentication in Control Medical Systems.
- Author
-
Hussain, Tahir, Hussain, Dostdar, Hussain, Israr, AlSalman, Hussain, Hussain, Saddam, Ullah, Syed Sajid, and Al-Hadhrami, Suheer
- Subjects
- *
HUMAN facial recognition software , *COVID-19 , *INTERNET of things , *DEEP learning , *IMAGE databases , *SMART locks , *IDENTITY theft , *SUPPORT vector machines - Abstract
Internet of Things (IoT) with deep learning (DL) is drastically growing and plays a significant role in many applications, including medical and healthcare systems. It can help users in this field get an advantage in terms of enhanced touchless authentication, especially in spreading infectious diseases like coronavirus disease 2019 (COVID-19). Even though there is a number of available security systems, they suffer from one or more of issues, such as identity fraud, loss of keys and passwords, or spreading diseases through touch authentication tools. To overcome these issues, IoT-based intelligent control medical authentication systems using DL models are proposed to enhance the security factor of medical and healthcare places effectively. This work applies IoT with DL models to recognize human faces for authentication in smart control medical systems. We use Raspberry Pi (RPi) because it has low cost and acts as the main controller in this system. The installation of a smart control system using general-purpose input/output (GPIO) pins of RPi also enhanced the antitheft for smart locks, and the RPi is connected to smart doors. For user authentication, a camera module is used to capture the face image and compare them with database images for getting access. The proposed approach performs face detection using the Haar cascade techniques, while for face recognition, the system comprises the following steps. The first step is the facial feature extraction step, which is done using the pretrained CNN models (ResNet-50 and VGG-16) along with linear binary pattern histogram (LBPH) algorithm. The second step is the classification step which can be done using a support vector machine (SVM) classifier. Only classified face as genuine leads to unlock the door; otherwise, the door is locked, and the system sends a notification email to the home/medical place with detected face images and stores the detected person name and time information on the SQL database. The comparative study of this work shows that the approach achieved 99.56% accuracy compared with some different related methods. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
49. Gender Identification and Classification of Drosophila melanogaster Flies Using Machine Learning Techniques.
- Author
-
Chola, Channabasava, Benifa, J. V. Bibal, Guru, D. S., Muaad, Abdullah Y., Hanumanthappa, J., Al-antari, Mugahed A., AlSalman, Hussain, and Gumaei, Abdu H.
- Subjects
- *
MACHINE learning , *FLYING machines , *GENETIC code , *SUPPORT vector machines , *FLIES , *DROSOPHILA melanogaster , *CENTRAL nervous system - Abstract
Drosophila melanogaster is an important genetic model organism used extensively in medical and biological studies. About 61% of known human genes have a recognizable match with the genetic code of Drosophila flies, and 50% of fly protein sequences have mammalian analogues. Recently, several investigations have been conducted in Drosophila to study the functions of specific genes exist in the central nervous system, heart, liver, and kidney. The outcomes of the research in Drosophila are also used as a unique tool to study human-related diseases. This article presents a novel automated system to classify the gender of Drosophila flies obtained through microscopic images (ventral view). The proposed system takes an image as input and converts it into grayscale illustration to extract the texture features from the image. Then, machine learning (ML) classifiers such as support vector machines (SVM), Naive Bayes (NB), and K -nearest neighbour (KNN) are used to classify the Drosophila as male or female. The proposed model is evaluated using the real microscopic image dataset, and the results show that the accuracy of the KNN is 90%, which is higher than the accuracy of the SVM classifier. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.