Hikmat A. M. Abdeljaber
YOU?
Author Swipe
View article: Medical Images Noise Removal using Improved Adversarial Generative Network
Medical Images Noise Removal using Improved Adversarial Generative Network Open
Introduction; The protection of patient privacy through medical image de-identification stands as a vital yet complicated healthcare challenge which demands both accurate diagnosis and privacy protection. Deep learning techniques now provi…
View article: Cuckoo-Inspired Algorithms for Selecting Features in the Prediction of Diabetes Using Machine Learning Models
Cuckoo-Inspired Algorithms for Selecting Features in the Prediction of Diabetes Using Machine Learning Models Open
View article: USING MACHINE LEARNING ALGORITHMS TO ANALYZE FACTORS INFLUENCING ACCEPTANCE OF E-LEARNING
USING MACHINE LEARNING ALGORITHMS TO ANALYZE FACTORS INFLUENCING ACCEPTANCE OF E-LEARNING Open
The COVID-19 pandemic has brought about measures like social distancing and lockdowns, significantly affecting educational institutions. Universities were forced to adapt to online or hybrid teaching models to continue academic activities.…
View article: Advanced Deep Learning Integration for Early Pneumonia Detection for Smart Healthcare
Advanced Deep Learning Integration for Early Pneumonia Detection for Smart Healthcare Open
The surveillance of symptoms related to pneumonia is increasingly crucial due to its widespread occurrence and similarity to symptoms exhibited in other contagious diseases such as influenza, respiratory syncytial virus (RSV), and COVID-19…
View article: An improved mayfly optimization with modified perturb and observe based energy management in grid integrated renewable sources
An improved mayfly optimization with modified perturb and observe based energy management in grid integrated renewable sources Open
View article: Phishing Website Detection: A Dataset-Centric Approach for Enhanced Security
Phishing Website Detection: A Dataset-Centric Approach for Enhanced Security Open
Introduction; Phishing involves cybercriminals creating fake websites that appear to be real sites with the aim of obtaining personal information. With the increasing sophistication of phishing websites, machine learning today provides a u…
View article: Organizational debt—Roadblock to agility in software engineering: Exploring an emerging concept and future research for software excellence
Organizational debt—Roadblock to agility in software engineering: Exploring an emerging concept and future research for software excellence Open
In software engineering, organizational debt (OD) is a crucial but little-researched phenomena. OD refers to the accumulation of outdated structures, policies, and processes that hinder an organization’s advancement and adaptability. This …
View article: Prediction and Diagnosis of Breast Cancer using Machine Learning Techniques
Prediction and Diagnosis of Breast Cancer using Machine Learning Techniques Open
Introduction: One of the most common types of cancer and a significant contributor to the high death rates among women is breast cancer. It usually occurs in women. It is crucial to acquire a diagnosis early in order to kill cancer from be…
View article: Optimizing blockchain for healthcare IoT: a practical guide to navigating scalability, privacy, and efficiency trade-offs
Optimizing blockchain for healthcare IoT: a practical guide to navigating scalability, privacy, and efficiency trade-offs Open
The adoption of blockchain technology provides significant disruptive benefits to internet-of-things (IoT) applications in healthcare in vital aspects like security, integrity, transparency, and efficiency. Nevertheless, in order to fully …
View article: Hybrid Agent-Based Load-Balancing Approach Used in an IaaS Platform
Hybrid Agent-Based Load-Balancing Approach Used in an IaaS Platform Open
Cloud computing has received a resounding welcome. It was created following methodical and thorough study in web services, distributed computing, utility computing, and virtualization, and it offers several benefits, including lower costs,…
View article: Efficient Communication in Wireless Sensor Networks Using Optimized Energy Efficient Engroove Leach Clustering Protocol
Efficient Communication in Wireless Sensor Networks Using Optimized Energy Efficient Engroove Leach Clustering Protocol Open
The Wireless Sensor Network (WSN) is a network that is constructed in regions that are inaccessible to human beings. The widespread deployment of wireless micro sensors will make it possible to conduct accurate environmental monitoring for…
View article: Artificial Intelligence Techniques for Landslides Prediction Using Satellite Imagery
Artificial Intelligence Techniques for Landslides Prediction Using Satellite Imagery Open
In hilly areas, landslides can occur due to natural factors such as heavy rainfall, earthquakes, moisture in soil, or man-made factors like unplanned constructions. Landslides can be disastrous leading to a huge loss of property and lives …
View article: Robust Non-Linear Active Function-Based FxRLS for Impulsive Active Noise Control
Robust Non-Linear Active Function-Based FxRLS for Impulsive Active Noise Control Open
Active Noise Control (ANC) is an effective technique for removing undesirable disturbances based on destructive interference between two noises (i.e., the superposition principle). To reduce the Non-Gaussian distribution of impulsive noise…
View article: Implication of Different Data Split Ratio on the Performance of Model in Price Prediction of Used Vehicles Using Regression Analysis
Implication of Different Data Split Ratio on the Performance of Model in Price Prediction of Used Vehicles Using Regression Analysis Open
Introduction: artificial intelligence (AI) and Machine Learning have become buzzwords lately due to technological changes and data quality testing, especially in shape and finish analysis. Lots of research has been conducted for linear reg…
View article: Achieving Organizational Effectiveness through Machine Learning Based Approaches for Malware Analysis and Detection
Achieving Organizational Effectiveness through Machine Learning Based Approaches for Malware Analysis and Detection Open
Introduction: as technology usage grows at an exponential rate, cybersecurity has become a primary concern. Cyber threats have become increasingly advanced and specific, posing a severe risk to individuals, businesses, and even governments…
View article: AsPeer: Method to Self and Peer Assessment in Large Online Design Classes
AsPeer: Method to Self and Peer Assessment in Large Online Design Classes Open
Peer and self-assessment open opportunities to scale assessments in online classrooms. This article reports our experiences of using AsPeer- peer assessment system, with two iterations of a university online class. We observed that peer gr…
View article: A Fuzzy Logic based Solution for Network Traffic Problems in Migrating Parallel Crawlers
A Fuzzy Logic based Solution for Network Traffic Problems in Migrating Parallel Crawlers Open
Search engines are the instruments for website navigation and search, because the Internet is big and has expanded greatly. By continuously downloading web pages for processing, search engines provide search facilities and maintain indices…
View article: Ensemble Learning Driven Computer-Aided Diagnosis Model for Brain Tumor Classification on Magnetic Resonance Imaging
Ensemble Learning Driven Computer-Aided Diagnosis Model for Brain Tumor Classification on Magnetic Resonance Imaging Open
Brain tumour (BT) detection involves the process of identifying the presence of a brain tumour in medical imaging, such as MRI scans. BT detection often relies on medical imaging techniques, such as MRI (Magnetic Resonance Imaging), CT (Co…
View article: AI Based Secure Analytics of Clinical Data in Cloud Environment: Towards Smart Cities and Healthcare
AI Based Secure Analytics of Clinical Data in Cloud Environment: Towards Smart Cities and Healthcare Open
View article: Effective Return Rate Prediction of Blockchain Financial Products Using Machine Learning
Effective Return Rate Prediction of Blockchain Financial Products Using Machine Learning Open
In recent times, financial globalization has drastically increased in different ways to improve the quality of services with advanced resources. The successful applications of bitcoin Blockchain (BC) techniques enable the stockholders to w…
View article: XAI-Based Reinforcement Learning Approach for Text Summarization of Social IoT-Based Content
XAI-Based Reinforcement Learning Approach for Text Summarization of Social IoT-Based Content Open
The purpose of automatic text summarising technology is to condense a given text while properly portraying the main information in the original text in a summary. To present generative text summarising approaches, on the other hand, restru…
View article: An Integration of IoT, IoC, and IoE towards Building a Green Society
An Integration of IoT, IoC, and IoE towards Building a Green Society Open
Energy waste altogether adds to expanded expenses in the car fabricating industry, which is liable to energy use limitations and tax assessment from national and global strategy creators and confinements and charges from national energy su…
View article: A Novel AI-Based Stock Market Prediction Using Machine Learning Algorithm
A Novel AI-Based Stock Market Prediction Using Machine Learning Algorithm Open
The time series forecasting system can be used for investments in a safe environment with minimized chances of loss. The Holt–Winters algorithm followed various procedures and observed the multiple factors applied to the neural network. Th…
View article: Issues of Clinical Identity Verification for Healthcare Applications over Mobile Terminal Platform
Issues of Clinical Identity Verification for Healthcare Applications over Mobile Terminal Platform Open
According to recent research, attacks on USIM cards are on the rise. In a 5G setting, attackers can also employ counterfeit USIM cards to circumvent the identity authentication of specified standard applications and steal user information.…
View article: A post COVID Machine Learning approach in Teaching and Learning methodology to alleviate drawbacks of the e-whiteboards
A post COVID Machine Learning approach in Teaching and Learning methodology to alleviate drawbacks of the e-whiteboards Open
Deep learning has paved the way for critical and revolutionary applications in almost every field of life in general. Ranging from engineering to healthcare, machine learning, and deep learning has left their mark as the state-of-the-art t…
View article: Development of a Hybrid Algorithm for efficient Task Scheduling in Cloud Computing environment using Artificial Intelligence
Development of a Hybrid Algorithm for efficient Task Scheduling in Cloud Computing environment using Artificial Intelligence Open
Cloud computing is developing as a platform for next generation systems where users can pay as they use facilities of cloud computing like any other utilities. Cloud environment involves a set of virtual machines, which share the same comp…
View article: Effect of stemming on text similarity for Arabic language at sentence level
Effect of stemming on text similarity for Arabic language at sentence level Open
Semantic Text Similarity (STS) has several and important applications in the field of Natural Language Processing (NLP). The Aim of this study is to investigate the effect of stemming on text similarity for Arabic language at sentence leve…
View article: Automatic Arabic Short Answers Scoring Using Longest Common Subsequence and Arabic WordNet
Automatic Arabic Short Answers Scoring Using Longest Common Subsequence and Arabic WordNet Open
The manual process of scoring short answers of Arabic essay questions is exhaustive, susceptible to error and consumes instructor’s time and resources. This paper explores longest common subsequence (LCS) algorithm as a string-based text s…
View article: Profile-Based Semantic Method using Heuristics for Web Search Personalization
Profile-Based Semantic Method using Heuristics for Web Search Personalization Open
User profiles play a critical role in personalizing user search. It assists search systems in retrieving relevant information that is searched on the web considering the user needs. Researchers presented a vast number of profile-based appr…
View article: Program Outcomes Assessment Method for Multi-Academic Accreditation Bodies: Computer Science Program as a Case Study
Program Outcomes Assessment Method for Multi-Academic Accreditation Bodies: Computer Science Program as a Case Study Open
In educational community, assessment process focuses on learning, teaching and outcomes. It provides information for improving learning and teaching. Therefore, a well-established assessment process plays a vital role for improving program…