13 results on '"ALMUKADI, WAFA SULAIMAN"'
Search Results
2. Deep feature fusion with computer vision driven fall detection approach for enhanced assisted living safety
- Author
-
Almukadi, Wafa Sulaiman, Alrowais, Fadwa, Saeed, Muhammad Kashif, Yahya, Abdulsamad Ebrahim, Mahmud, Ahmed, and Marzouk, Radwa
- Published
- 2024
- Full Text
- View/download PDF
3. Deep learning solutions for inverse problems in advanced biomedical image analysis on disease detection
- Author
-
Alshardan, Amal, Mahgoub, Hany, Alruwais, Nuha, Darem, Abdulbasit A., Almukadi, Wafa Sulaiman, and Mohamed, Abdullah
- Published
- 2024
- Full Text
- View/download PDF
4. Explainable artificial intelligence in web phishing classification on secure IoT with cloud-based cyber-physical systems
- Author
-
Alotaibi, Sultan Refa, Alkahtani, Hend Khalid, Aljebreen, Mohammed, Alshuhail, Asma, Saeed, Muhammad Kashif, Ebad, Shouki A., Almukadi, Wafa Sulaiman, and Alotaibi, Moneerah
- Published
- 2025
- Full Text
- View/download PDF
5. Enhancing cybersecurity via attribute reduction with deep learning model for false data injection attack recognition.
- Author
-
Alrslani, Faheed A.F., Alohali, Manal Abdullah, Aljebreen, Mohammed, Alqahtani, Hamed, Alshuhail, Asma, Alshammeri, Menwa, and Almukadi, Wafa Sulaiman
- Abstract
Cyberattacks have given rise to several phenomena and have raised concerns among users and power system operators. When they are built to bypass state estimation bad data recognition methods executed in the conventional grid system control room, False Data Injection Attacks (FDIA) pose a significant security threat to the operation of power systems. Therefore, real-time monitoring becomes inevitable with the quick implementation of renewables within the grid operator. The state estimation algorithm plays a major role in defining the grid’s operating scenarios. FDIA creates a significant risk to these estimation strategies by adding malicious information to the measurement obtained. Real-time recognition of these attack classes improves grid resiliency and ensures a secure grid operation. This study introduces a novel Attribute Reduction with a Deep Learning-based False Data Injection Attack Recognition (ARDL-FDIAR) technique. The primary goal of the ARDL-FDIAR technique is to improve security via the FDIA detection process. The ARDL-FDIAR technique uses Z-score normalization to scale the input data. The attribute reduction process gets invoked using the modified Lemrus optimization algorithm (MLOA) to choose optimal feature sets. Moreover, the FDIA detection process is performed by modelling an improved deep belief network (IDBN) model. Furthermore, the performance of the IDBN model is improved by the Cetacean Optimization Algorithm (COA)-based hyperparameter tuning process. A series of experiments were performed to ensure the enhancement of the ARDL-FDIAR technique. The results indicated the enhanced security performance of the ARDL-FDIAR technique compared to other DL approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
6. AN ELECTRONIC PRESCRIBING SYSTEM FOR TELECONSULTATION USING HEALTHCARE 5.0 INNOVATIONS.
- Author
-
AL-ANAZI, REEMA G., SINGLA, CHINU, ALZAIDI, MUHAMMAD SWAILEH A., ALAMGEER, MOHAMMAD, ASKLANY, SOMIA A., TANEJA, NIVEDITA, ALMUKADI, WAFA SULAIMAN, and MOHAMED, ABDELMONEIM ALI
- Subjects
NATURAL language processing ,DRUG side effects ,MEDICAL personnel ,MEDICATION errors ,HEALTH services accessibility - Abstract
This study explores the integration of Industry 5.0 innovations into the healthcare sector to address prevalent issues related to prescription errors, drug side effects, and healthcare accessibility. It introduces a novel system that enables healthcare professionals to create prescriptions efficiently through voice commands and facilitates secure delivery to patients via email or SMS. Additionally, the research discusses the potential of digitizing the medical sector to reduce paper usage. By providing an accessible alternative to self-medication, this system aims to enhance patient safety and mitigate the risks associated with misconceptions regarding self-treatment. This paper seeks to introduce and assess an innovative fractal electronic prescription system that uses Healthcare 5.0 technologies within the framework of teleconsultation. It aims to tackle the constraints and drawbacks associated with conventional prescription approaches by putting forth cutting-edge technologies and telecommunication functionalities to elevate the effectiveness, precision, and patient-centric nature of the prescription procedure. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. HARNESSING BLOCKCHAIN WITH ENSEMBLE DEEP LEARNING-BASED DISTRIBUTED DOS ATTACK DETECTION IN IOT-ASSISTED SECURE CONSUMER ELECTRONICS SYSTEMS.
- Author
-
ALRAYES, FATMA S., ALJEBREEN, MOHAMMED, ALGHAMDI, MOHAMMED, ALRSLANI, FAHEED A. F., ALSHUHAIL, ASMA, ALMUKADI, WAFA SULAIMAN, BASHETI, IMAN, and SHARIF, MAHIR MOHAMMED
- Subjects
LONG short-term memory ,ARTIFICIAL intelligence ,CYBERTERRORISM ,OPTIMIZATION algorithms ,DATABASES - Abstract
Consumer electronics (CE) and the Internet of Things (IoTs) are transforming daily routines by integrating smart technology into household gadgets. IoT allows devices to link and communicate from the Internet with better functions, remote control, and automation of various complex systems simulation platforms. The quick progress in IoT technology has continuously driven the progress of further connected and intelligent CEs, shaping more smart cities and homes. Blockchain (BC) technology is emerging as a promising technology offering immutable distributed ledgers that improve the security and integrity of data. However, even with BC resilience, the IoT ecosystem remains vulnerable to Distributed Denial of Service (DDoS) attacks. In contrast, the malicious actor overwhelms the network with traffic, disrupting services and compromising device functionality. Incorporating BC with IoT infrastructure presents groundbreaking techniques to alleviate these threats. IoT networks can better detect and respond to DDoS attacks in real time by leveraging BC cryptographic techniques and decentralized consensus mechanisms, which safeguard against disruptions and enhance resilience. There must be a reliable mechanism of recognition based on adequate techniques to detect and identify whether these attacks have happened or not in the system. Artificial intelligence (A) is the most common technique that uses machine learning (ML) and deep learning (DL) to recognize cyber threats. This research presents a new Blockchain with Ensemble Deep Learning-based Distributed DoS Attack Detection (BCEDL-DDoSD) approach in the IoT platform. The primary intention of the BCEDL-DDoSD approach is to leverage BC with a DL-based attack recognition process in the IoT platform. BC technology is utilized to enable a secure data transmission process. In the BCEDL-DDoSD approach, Z-score normalization is initially employed to measure the input data. Besides, the selection of features takes place using the Fractal Wombat optimization algorithm (WOA). For attack recognition, the BCDL-DDoSD technique applies an ensemble of three models, namely denoising autoencoder (DAE), gated recurrent unit (GRU), and long short-term memory (LSTM). Lastly, an orca predator algorithm (OPA)-based hyperparameter tuning procedure has been implemented to select the parameter value of DL models. A sequence of simulations is made on the benchmark database to authorize the performance of the BCDL-DDoSD approach. The simulation results showed that the BCDL-DDoSD approach performs better than other DL techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. INTEGRATING FRACTAL SNOW ABLATION OPTIMIZER WITH BAYESIAN MACHINE LEARNING FOR ASPECT-LEVEL SENTIMENT ANALYSIS ON SOCIAL MEDIA.
- Author
-
EBAD, SHOUKI A., SUBAIT, WALA BIN, NEMRI, NADHEM, ALMUKADI, WAFA SULAIMAN, ALJOHANI, NASSER, YAFOZ, AYMAN, ALSINI, RAED, and DUHAYYIM, MESFER AL
- Subjects
SOCIAL media ,NATURAL language processing ,SENTIMENT analysis ,MACHINE learning ,CONSUMER psychology ,USER-generated content ,SOCIAL media in business - Abstract
Social media platforms have become vast repositories of user-generated content, offering an abundant data source for sentiment analysis (SA). SA is a natural language processing (NLP) algorithm that defines the sentiment or emotional tone expressed in the given text. It includes utilizing computational techniques to automatically detect and categorize the sentiment as negative, positive, or neutral. Aspect-based SA (ABSA) systems leverage machine learning (ML) approaches to discriminate nuanced opinions within the text, which break down sentiment through particular attributes or aspects of the subject matter. Businesses and researchers can gain deep insights into brand perception, public opinion, and product feedback by integrating social media data with ABSA methodologies. This enables the extraction of sentiment polarity and more actionable and targeted insights. By applying ML approaches trained on the abundance of social media data, organizations can identify areas for improvement, tailor their strategies to meet their audience's evolving needs and preferences and better understand customer sentiments. In this view, this study develops a new Fractal Snow Ablation Optimizer with Bayesian Machine Learning for Aspect-Level Sentiment Analysis (SAOBML-ALSA) technique on social media. The SAOBML-ALSA approach examines social media content to identify sentiments into distinct classes. In the primary stage, the SAOBML-ALSA technique preprocesses the input social media content to transform it into a meaningful format. This is followed by a LeBERT-based word embedding process. The SAOBML-ALSA technique applies a Naïve Bayes (NB) classifier for ALSA. Eventually, the parameter selection of the NB classifier will be done using the SAO technique. The performance evaluation of the SAOBML-ALSA methodology was examined under the benchmark database. The experimental results stated that the SAOBML-ALSA technique exhibits promising performance compared to other models. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. AN EFFICIENT FRACTAL CARDIO DISEASES ANALYSIS USING OPTIMIZED DEEP LEARNING MODEL IN CLOUD OF THING CONTINUUM ARCHITECTURE.
- Author
-
ALOHALI, MANAL ABDULLAH, ARASI, MUNYA A., ALAHMARI, SAAD, ALSHUHAIL, ASMA, ALMUKADI, WAFA SULAIMAN, ALGHAMDI, BANDAR M., and ALALLAH, FOUAD SHOIE
- Subjects
CONVOLUTIONAL neural networks ,AUTOENCODER ,SPORTS ethics ,COMMUNICATION infrastructure ,HEART cells ,DEEP learning - Abstract
Exercise has long been known to improve cardiovascular health, energy metabolism, and well-being. However, myocardial cell responses to exercise are complex and multifaceted due to their molecular pathways. To understand cardiac physiology and path physiology, one must understand these pathways, including energy autophagy. In recent years, deep learning techniques, IoT devices, and cloud computing infrastructure have enabled real-time, large-scale biological data analysis. The objective of this work is to extract and analyze autophagy properties in exercise-induced cardiac cells in a cloud-IoT context using deep learning, more especially an autoencoder. The Shanghai University of Sport Ethics Committee for Science Research gave its approval for the data collection, which involved 150 male Sprague–Dawley (SD) rats that were eight weeks old and in good health. The Z -score normalization method was used to standardize the data. Fractal optimization methods could be applied to these algorithms. For example, fractal-inspired optimization techniques might be used to analyze deep learning with Autoencoder, the autography energy of exercise myocardial cells within a cloud-IoT. To capture the intricate myocardial energy autophagy during exercise, we introduced the DMO-GCNN-Autoencoder, a Dwarf Mongoose Optimized Graph Convolutional Neural Network. The results showed that the proposed network's performance matches that of the existing methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. HARNESSING PRIVACY-PRESERVING FEDERATED LEARNING WITH BLOCKCHAIN FOR SECURE IOMT APPLICATIONS IN SMART HEALTHCARE SYSTEMS.
- Author
-
ALKHALIFA, AMAL K., ALANAZI, MESHARI H., MAHMOOD, KHALID, ALMUKADI, WAFA SULAIMAN, QURASHI, MOHAMMED AL, ALSHEHRI, ASMA HASSAN, ALANAZI, FUHID, and MOHAMED, ABDELMONEIM ALI
- Subjects
FEDERATED learning ,MACHINE learning ,FEATURE selection ,MEDICAL personnel ,SECURITY systems - Abstract
The Internet of Medical Things (IoMT) refers to interconnected medical systems and devices that gather and transfer healthcare information for several medical applications. Smart healthcare leverages IoMT technology to improve patient diagnosis, monitoring, and treatment, providing efficient and personalized healthcare services. Privacy-preserving Federated Learning (PPFL) is a privacy-enhancing method that allows collaborative method training through distributed data sources while ensuring privacy protection and keeping the data decentralized. In the field of smart healthcare, PPFL enables healthcare professionals to train machine learning algorithms jointly on their corresponding datasets without sharing sensitive data, thereby maintaining confidentiality. Within this framework, anomaly detection includes detecting unusual events or patterns in healthcare data like unexpected changes or irregular vital signs in patient behaviors that can represent security breaches or potential health issues in the IoMT system. Smart healthcare systems could enhance patient care while protecting data confidentiality and individual privacy by incorporating PPFL with anomaly detection techniques. Therefore, this study develops a Privacy-preserving Federated Learning with Blockchain-based Smart Healthcare System (PPFL-BCSHS) technique in the IoMT environment. The purpose of the PPFL-BCSHS technique is to secure the IoMT devices via the detection of abnormal activities and FL concepts. Besides, BC technology can be applied for the secure transmission of medical data among the IoMT devices. The PPFL-BCSHS technique employs the FL for training the model for the identification of abnormal patterns. For anomaly detection, the PPFL-BCSHS technique follows three major processes, namely Mountain Gazelle Optimization (MGO)-based feature selection, Bidirectional Gated Recurrent Unit (BiGRU), and Sandcat Swarm Optimization (SCSO)-based hyperparameter tuning. A series of simulations were implemented to examine the performance of the PPFL-BCSHS method. The empirical analysis highlighted that the PPFL-BCSHS method obtains improved security over other approaches under various measures. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. UTILIZING CONVOLUTIONAL NEURAL NETWORKS TO COMPREHEND SIGN LANGUAGE AND RECOGNIZE EMOTIONS.
- Author
-
SINGLA, CHINU, SUBAIT, WALA BIN, MAHGOUB, HANY, YAHYA, ABDULSAMAD EBRAHIM, ALZAIDI, MUHAMMAD S. A., MUNJAL, MUSKAAN, ALMUKADI, WAFA SULAIMAN, and ALJAWARN, NADER MOHAMMAD
- Subjects
NATURAL language processing ,SIGN language ,CONVOLUTIONAL neural networks ,ORAL communication ,FACIAL expression ,DEAF children ,MOTION capture (Human mechanics) - Abstract
The inability to communicate verbally is widely acknowledged as a significant disability. The primary objective of this research is to create a practical system aimed at individuals with hearing impairments, particularly those who depend on sign language as their primary means of communication. This system aims to enable deaf individuals to express themselves, communicate effectively and facilitate understanding of their language which would otherwise be challenging since most people are unfamiliar with sign language. By employing human gesture interpretation and motion capture, this technology can facilitate the translation of sign language into spoken language and vice versa. Despite the existence of various methods to convert sign language into voice, none of them currently provide an entirely intuitive user interface. Our objective is to create a system that not only translates sign language but also integrates a natural user interface, thus enhancing accessibility for individuals who are blind or have visual impairments. This system will achieve this by recognizing facial expressions and effectively conveying emotions behind words assisting visually impaired individuals in expressing themselves more effectively. Hence, in this project, we tentatively aim to build a system that can ease the lives of blind, deaf and dumb people to some extent. Normal communication like normal people do might never be possible for differently abled people but through our project, we try to provide them with a tool that can help them experience normalcy while communicating with normal people. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. MOTION TARGET MONITORING AND RECOGNITION IN VIDEO SURVEILLANCE USING CLOUD–EDGE–IOT AND MACHINE LEARNING TECHNIQUES.
- Author
-
ALKHALIFA, AMAL K., ZAQAIBEH, BELAL, HASSINE, SIWAR BEN HAJ, YAHYA, ABDULSAMAD EBRAHIM, ALMUKADI, WAFA SULAIMAN, SOROUR, SHAYMAA, ALZAHRANI, YAZEED, and MAJDOUBI, JIHEN
- Subjects
MULTISENSOR data fusion ,DUST storms ,TRAFFIC signs & signals ,VIDEO surveillance ,VIDEO monitors - Abstract
We are aware that autonomous vehicle handles camera and LiDAR data pipelines and uses the sensor pictures to provide an autonomous object identification solution. While current research yields reasonable results, it falls short of offering practical solutions. For example, lane markings and traffic signs may become obscured by accumulation on roads, making it unsafe for a self-driving car to navigate. Moreover, the car's sensors may be severely hindered by intense rain, snow, fog, or dust storms, which could endanger human safety. So, this research introduced Multi-Sensor Fusion and Segmentation for Deep Q -Network (DQN)-based Multi-Object Tracking in Autonomous Vehicles. Improved Adaptive Extended Kalman Filter (IAEKF) for noise reduction, Normalized Gamma Transformation-based CLAHE (NGT-CLAHE) for contrast enhancement, and Improved Adaptive Weighted Mean Filter (IAWMF) for adaptive thresholding have been used. A novel multi-segmentation using several segmentation methods and degrees dependent on the orientation of images has been used. DenseNet (D Net)-based multi-image fusion provides faster processing speeds and increased efficiency. The grid map-based pathways and lanes are chosen using the Energy Valley Optimizer (EVO) technique. This method easily achieves flexibility, robustness, and scalability by simplifying the complex activities. Furthermore, the YOLOv7 model is used for classification and detection. Metrics like velocity, accuracy rate, success rate, success ratio, and mean-squared error are used to assess the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Vehicle Classification Using Deep Feature Fusion and Genetic Algorithms
- Author
-
Alghamdi, Ahmed S., primary, Saeed, Ammar, additional, Kamran, Muhammad, additional, Mursi, Khalid T., additional, and Almukadi, Wafa Sulaiman, additional
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.