Hani Alshahrani
YOU?
Author Swipe
View article: Next generation sequencing under attack: investigating insider threats and organizational behaviour
Next generation sequencing under attack: investigating insider threats and organizational behaviour Open
Next generation sequencing (NGS) has become a cornerstone of modern genomics, enabling high-throughput analysis of DNA and RNA with wide applications across medicine, research, and biotechnology. However, the growing adoption of NGS techno…
View article: Efficient and Accurate Zero-Day Electricity Theft Detection from Smart Meter Sensor Data Using Prototype and Ensemble Learning
Efficient and Accurate Zero-Day Electricity Theft Detection from Smart Meter Sensor Data Using Prototype and Ensemble Learning Open
Electricity theft remains a pressing challenge in modern smart grid systems, leading to significant economic losses and compromised grid stability. This paper presents a sensor-driven framework for electricity theft detection that leverage…
View article: An improved deep CNN-based freshwater fish classification with cascaded bio-inspired networks
An improved deep CNN-based freshwater fish classification with cascaded bio-inspired networks Open
Bangladesh has plentiful water, which is essential to its freshwater fish traditions. Environmental concerns and other causes have reduced the country's water resources, threatening many native freshwater fish species. Thus, the younger ge…
View article: Cyber-Biosecurity Challenges in Next-Generation Sequencing: A Comprehensive Analysis of Emerging Threat Vectors
Cyber-Biosecurity Challenges in Next-Generation Sequencing: A Comprehensive Analysis of Emerging Threat Vectors Open
Next-generation sequencing (NGS) has transformed genomic research and healthcare by enabling the rapid and cost-effective sequencing of DNA and RNA, surpassing traditional techniques such as Sanger sequencing. This technological leap has h…
View article: Attention based UNet model for breast cancer segmentation using BUSI dataset
Attention based UNet model for breast cancer segmentation using BUSI dataset Open
Breast cancer, a prevalent and life-threatening disease, necessitates early detection for the effective intervention and the improved patient health outcomes. This paper focuses on the critical problem of identifying breast cancer using a …
View article: Prior-free 3D human pose estimation in a video using limb-vectors
Prior-free 3D human pose estimation in a video using limb-vectors Open
Estimating accurate 3D human poses from a monocular video is fundamental to various computer vision tasks. Existing methods exploit 2D-to-3D pose lifting, multiview images, and depth sensors to model spatio-temporal dependencies. However, …
View article: Deep neural network and trust management approach to secure smart transportation data in sustainable smart cities
Deep neural network and trust management approach to secure smart transportation data in sustainable smart cities Open
Smart transportation, powered by IoT, transforms mobility with interconnected sensors and devices collecting real-time data on traffic, vehicle locations, and passenger needs. This fosters a safer and more sustainable transportation ecosys…
View article: Analyzing anonymous activities using Interrupt-aware Anonymous User-System Detection Method (IAU-S-DM) in IoT
Analyzing anonymous activities using Interrupt-aware Anonymous User-System Detection Method (IAU-S-DM) in IoT Open
View article: Deep Anomaly Detection Framework Utilizing Federated Learning for Electricity Theft Zero-Day Cyberattacks
Deep Anomaly Detection Framework Utilizing Federated Learning for Electricity Theft Zero-Day Cyberattacks Open
Smart power grids suffer from electricity theft cyber-attacks, where malicious consumers compromise their smart meters (SMs) to downscale the reported electricity consumption readings. This problem costs electric utility companies worldwid…
View article: Demand prediction for urban air mobility using deep learning
Demand prediction for urban air mobility using deep learning Open
Urban air mobility, also known as UAM, is currently being researched in a variety of metropolitan regions throughout the world as a potential new mode of transport for travelling shorter distances inside a territory. In this article, we in…
View article: Detection of Malicious Threats Exploiting Clock-Gating Hardware Using Machine Learning
Detection of Malicious Threats Exploiting Clock-Gating Hardware Using Machine Learning Open
Embedded system technologies are increasingly being incorporated into manufacturing, smart grid, industrial control systems, and transportation systems. However, the vast majority of today’s embedded platforms lack the support of built-in …
View article: A machine learning and deep learning-based integrated multi-omics technique for leukemia prediction
A machine learning and deep learning-based integrated multi-omics technique for leukemia prediction Open
In recent years, scientific data on cancer has expanded, providing potential for a better understanding of malignancies and improved tailored care. Advances in Artificial Intelligence (AI) processing power and algorithmic development posit…
View article: Hybrid feature selection and classification technique for early prediction and severity of diabetes type 2
Hybrid feature selection and classification technique for early prediction and severity of diabetes type 2 Open
Diabetes prediction is an ongoing study topic in which medical specialists are attempting to forecast the condition with greater precision. Diabetes typically stays lethargic, and on the off chance that patients are determined to have anot…
View article: An intelligent LinkNet-34 model with EfficientNetB7 encoder for semantic segmentation of brain tumor
An intelligent LinkNet-34 model with EfficientNetB7 encoder for semantic segmentation of brain tumor Open
View article: An Innovative Ensemble Deep Learning Clinical Decision Support System for Diabetes Prediction
An Innovative Ensemble Deep Learning Clinical Decision Support System for Diabetes Prediction Open
Diabetes is a significant global health concern, with an increasing number of diabetic people at risk. It is considered a chronic disease and leads to a significant number of fatalities annually. Early prediction of diabetes is essential f…
View article: Improving Endoscopic Image Analysis: Attention Mechanism Integration in Grid Search Fine-Tuned Transfer Learning Model for Multi-Class Gastrointestinal Disease Classification
Improving Endoscopic Image Analysis: Attention Mechanism Integration in Grid Search Fine-Tuned Transfer Learning Model for Multi-Class Gastrointestinal Disease Classification Open
Due to a continuous change in people’s lifestyle and dietary habits, gastrointestinal diseases are on the increase, with dietary changes being a major contributor to a variety of bowel problems. Around two million people around the world d…
View article: Securing UAV Networks: A Lightweight Chaotic-Frequency Hopping Approach to Counter Jamming Attacks
Securing UAV Networks: A Lightweight Chaotic-Frequency Hopping Approach to Counter Jamming Attacks Open
Drones, also known as unmanned aerial vehicles (UAVs), are becoming more and more widespread for a variety of uses, including delivery, inspection, and monitoring. On the other hand, safe communication between drones is a crucial problem t…
View article: Corrections to “A Comparative Analysis of Metaheuristic Techniques for High Availability Systems”
Corrections to “A Comparative Analysis of Metaheuristic Techniques for High Availability Systems” Open
Presents corrections to the paper, (Corrections to “A Comparative Analysis of Metaheuristic Techniques for High Availability Systems”).
View article: Reconstruction of 3D Non-Rigid Moving Human Targets Based on Reliable Estimation of Contour Deformation Degree
Reconstruction of 3D Non-Rigid Moving Human Targets Based on Reliable Estimation of Contour Deformation Degree Open
The human body is a typical non-rigid object, and its 3D reconstruction is a classic problem in the field of computer vision. Due to the inherent complexity and dynamism of the human body, it is not suitable for existing non-rigid 3D motio…
View article: Social Media-Based Surveillance Systems for Health Informatics Using Machine and Deep Learning Techniques: A Comprehensive Review and Open Challenges
Social Media-Based Surveillance Systems for Health Informatics Using Machine and Deep Learning Techniques: A Comprehensive Review and Open Challenges Open
Social media (SM) based surveillance systems, combined with machine learning (ML) and deep learning (DL) techniques, have shown potential for early detection of epidemic outbreaks.This review discusses the current state of SM-based surveil…
View article: A Comparative Analysis of Metaheuristic Techniques for High Availability Systems
A Comparative Analysis of Metaheuristic Techniques for High Availability Systems Open
In the ever-evolving technological landscape, ensuring high system availability has become a paramount concern. This research paper focuses on cloud computing, a domain witnessing exponential growth and emerging as a critical use case for …
View article: Enhancing Breast Cancer Detection and Classification Using Advanced Multi-Model Features and Ensemble Machine Learning Techniques
Enhancing Breast Cancer Detection and Classification Using Advanced Multi-Model Features and Ensemble Machine Learning Techniques Open
Breast cancer (BC) is the most common cancer among women, making it essential to have an accurate and dependable system for diagnosing benign or malignant tumors. It is essential to detect this cancer early in order to inform subsequent tr…
View article: An Intelligent Attention-Based Transfer Learning Model for Accurate Differentiation of Bone Marrow Stains to Diagnose Hematological Disorder
An Intelligent Attention-Based Transfer Learning Model for Accurate Differentiation of Bone Marrow Stains to Diagnose Hematological Disorder Open
Bone marrow (BM) is an essential part of the hematopoietic system, which generates all of the body’s blood cells and maintains the body’s overall health and immune system. The classification of bone marrow cells is pivotal in both clinical…
View article: CANAttack: Assessing Vulnerabilities within Controller Area Network
CANAttack: Assessing Vulnerabilities within Controller Area Network Open
Current vehicles include electronic features that provide ease and convenience to drivers. These electronic features or nodes rely on in-vehicle communication protocols to ensure functionality. One of the most-widely adopted in-vehicle pro…
View article: Artificial Intelligence-Based Secured Power Grid Protocol for Smart City
Artificial Intelligence-Based Secured Power Grid Protocol for Smart City Open
Due to the modern power system’s rapid development, more scattered smart grid components are securely linked into the power system by encircling a wide electrical power network with the underpinning communication system. By enabling a wide…
View article: Sustainable Apple Disease Management Using an Intelligent Fine-Tuned Transfer Learning-Based Model
Sustainable Apple Disease Management Using an Intelligent Fine-Tuned Transfer Learning-Based Model Open
Apple foliar diseases are a group of diseases that affect the leaves of apple trees. These diseases can significantly impact apple tree health and fruit yield. Ordinary apple foliar diseases include frog_eye_leaf_spots, powdery mildew, rus…
View article: EfficientNetB0 cum FPN Based Semantic Segmentation of Gastrointestinal Tract Organs in MRI Scans
EfficientNetB0 cum FPN Based Semantic Segmentation of Gastrointestinal Tract Organs in MRI Scans Open
The segmentation of gastrointestinal (GI) organs is crucial in radiation therapy for treating GI cancer. It allows for developing a targeted radiation therapy plan while minimizing radiation exposure to healthy tissue, improving treatment …
View article: ResRandSVM: Hybrid Approach for Acute Lymphocytic Leukemia Classification in Blood Smear Images
ResRandSVM: Hybrid Approach for Acute Lymphocytic Leukemia Classification in Blood Smear Images Open
Acute Lymphocytic Leukemia is a type of cancer that occurs when abnormal white blood cells are produced in the bone marrow which do not function properly, crowding out healthy cells and weakening the immunity of the body and thus its abili…
View article: Author Index
Author Index Open
View article: Intrusion Detection Framework for Industrial Internet of Things Using Software Defined Network
Intrusion Detection Framework for Industrial Internet of Things Using Software Defined Network Open
The Industrial Internet of Things (IIoT) refers to the employment of the Internet of Things in industrial management, where a substantial number of machines and devices are linked and synchronized with the help of software programs and thi…