Manal Abdullah Alohali
YOU?
Author Swipe
View article: Intelligent feature fusion with dynamic graph convolutional recurrent network for robust object detection to assist individuals with disabilities in a smart Iot edge-cloud environment
Intelligent feature fusion with dynamic graph convolutional recurrent network for robust object detection to assist individuals with disabilities in a smart Iot edge-cloud environment Open
View article: Privacy preserving blockchain integrated explainable artificial intelligence with two tier optimization for cyber threat detection and mitigation in the internet of things
Privacy preserving blockchain integrated explainable artificial intelligence with two tier optimization for cyber threat detection and mitigation in the internet of things Open
View article: Improving internet of health things security through anomaly detection framework using artificial intelligence driven ensemble approaches
Improving internet of health things security through anomaly detection framework using artificial intelligence driven ensemble approaches Open
Cybersecurity incidents have become an increasing difficulty for the medical field as the extensive overview of technology in the health care systems. In the past few years, the amount of attacks has improved quickly in health care, and it…
View article: Advanced smart human activity recognition system for disabled people using artificial intelligence with snake optimizer techniques
Advanced smart human activity recognition system for disabled people using artificial intelligence with snake optimizer techniques Open
Human Activity Recognition (HAR) has become an active research area in recent years due to its applicability in various domains and the growing need for convenient facilities and intelligent homes for the elderly. Physical activity tends t…
View article: Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning framework
Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning framework Open
Cybersecurity has been defined as a vital part of the developments, which is mainly related to technology. Enlarged cybersecurity safeguards that the data remains safe. Cyberattacks like computer malware, denial-of-service (DoS) attacks, o…
View article: End-to-end feature fusion for jointly optimized speech enhancement and automatic speech recognition
End-to-end feature fusion for jointly optimized speech enhancement and automatic speech recognition Open
View article: Two stage malware detection model in internet of vehicles (IoV) using deep learning-based explainable artificial intelligence with optimization algorithms
Two stage malware detection model in internet of vehicles (IoV) using deep learning-based explainable artificial intelligence with optimization algorithms Open
View article: Integrating cyber-physical systems with embedding technology for controlling autonomous vehicle driving
Integrating cyber-physical systems with embedding technology for controlling autonomous vehicle driving Open
Cyber-physical systems (CPSs) in autonomous vehicles must handle highly dynamic and uncertain settings, where unanticipated impediments, shifting traffic conditions, and environmental changes all provide substantial decision-making issues.…
View article: An Enhanced Wheat Stripe Rust Segmentation Approach Using Vision Transformer Model
An Enhanced Wheat Stripe Rust Segmentation Approach Using Vision Transformer Model Open
Worldwide, the wheat industry encounters major obstacles caused by stripe rust disease, triggered by the fungus Puccinia striiformis. This disease results in considerable losses of wheat crops and has significant economic repercussions. Ac…
View article: Optimized deep learning approach for lung cancer detection using flying fox optimization and bidirectional generative adversarial networks
Optimized deep learning approach for lung cancer detection using flying fox optimization and bidirectional generative adversarial networks Open
Lung cancer remains one of the most prevalent and life-threatening diseases, often diagnosed at an advanced stage due to the challenges in early detection. Contributory factors include genetic mutations, smoking, alcohol consumption, and e…
View article: Advanced Smart Activity Recognition System for Disabled People Using Artificial Intelligence with Hybrid Sine-Cosine Chimp Optimization Techniques
Advanced Smart Activity Recognition System for Disabled People Using Artificial Intelligence with Hybrid Sine-Cosine Chimp Optimization Techniques Open
A smart activity recognition system for the disabled utilizes advanced algorithms and sensor information for daily activity surveillance, improving independence and safety. This technology presents personalized assistance by precisely dete…
View article: Deep convolutional neural network-based enhanced crowd density monitoring for intelligent urban planning on smart cities
Deep convolutional neural network-based enhanced crowd density monitoring for intelligent urban planning on smart cities Open
View article: Advances in colorectal cancer diagnosis using optimal deep feature fusion approach on biomedical images
Advances in colorectal cancer diagnosis using optimal deep feature fusion approach on biomedical images Open
Colorectal cancer (CRC) is the second popular cancer in females and third in males, with an increased number of cases. Pathology diagnoses complemented with predictive and prognostic biomarker information is the first step for personalized…
View article: Enhancing cybersecurity via attribute reduction with deep learning model for false data injection attack recognition
Enhancing cybersecurity via attribute reduction with deep learning model for false data injection attack recognition Open
Cyberattacks have given rise to several phenomena and have raised concerns among users and power system operators. When they are built to bypass state estimation bad data recognition methods executed in the conventional grid system control…
View article: C-HIDE: A Steganographic Framework for Robust Data Hiding and Advanced Security Using Coverless Hybrid Image Encryption With AES and ECC
C-HIDE: A Steganographic Framework for Robust Data Hiding and Advanced Security Using Coverless Hybrid Image Encryption With AES and ECC Open
Coverless image steganography conceals information without modifying the carrier image, addressing vulnerabilities in traditional methods. However, existing approaches often require transmitting metadata, raising suspicion and security ris…
View article: Integrating Two-Tier Optimization Algorithm With Convolutional Bi-LSTM Model for Robust Anomaly Detection in Autonomous Vehicles
Integrating Two-Tier Optimization Algorithm With Convolutional Bi-LSTM Model for Robust Anomaly Detection in Autonomous Vehicles Open
Industrial development has changed vehicles of traditional into autonomous vehicles (AVs). AVs play a significant role since they are measured as a vital module of smart cities. The AV is an advanced automobile efficient in preserving secu…
View article: IOT-DRIVEN HEART DISEASE PREDICTION WITH INTELLIGENT CLASSIFIER AND SQUIRREL SEARCH FEATURE SELECTION
IOT-DRIVEN HEART DISEASE PREDICTION WITH INTELLIGENT CLASSIFIER AND SQUIRREL SEARCH FEATURE SELECTION Open
Cardiovascular disease (CVD) is the leading cause of global mortality in the modern world. This situation is difficult to predict and requires a combination of advanced techniques and specialist knowledge. Healthcare systems have recently …
View article: Sandpiper optimization with hybrid deep learning model for blockchain-assisted intrusion detection in iot environment
Sandpiper optimization with hybrid deep learning model for blockchain-assisted intrusion detection in iot environment Open
Intrusion detection in the Internet of Things (IoTs) is a vital unit of IoT safety. IoT devices face diverse kinds of attacks, and intrusion detection systems (IDSs) play a significant role in detecting and responding to these threats. A t…
View article: AN EFFICIENT FRACTAL CARDIO DISEASES ANALYSIS USING OPTIMIZED DEEP LEARNING MODEL IN CLOUD OF THING CONTINUUM ARCHITECTURE
AN EFFICIENT FRACTAL CARDIO DISEASES ANALYSIS USING OPTIMIZED DEEP LEARNING MODEL IN CLOUD OF THING CONTINUUM ARCHITECTURE Open
Exercise has long been known to improve cardiovascular health, energy metabolism, and well-being. However, myocardial cell responses to exercise are complex and multifaceted due to their molecular pathways. To understand cardiac physiology…
View article: Swin-GA-RF: genetic algorithm-based Swin Transformer and random forest for enhancing cervical cancer classification
Swin-GA-RF: genetic algorithm-based Swin Transformer and random forest for enhancing cervical cancer classification Open
Cervical cancer is a prevalent and concerning disease affecting women, with increasing incidence and mortality rates. Early detection plays a crucial role in improving outcomes. Recent advancements in computer vision, particularly the Swin…
View article: Archimedes Optimization Algorithm With Deep Learning Assisted Content-Based Image Retrieval in Healthcare Sector
Archimedes Optimization Algorithm With Deep Learning Assisted Content-Based Image Retrieval in Healthcare Sector Open
Content-based image retrieval (CBIR) in the healthcare field is an advanced technology that leverages the visual or content features of medical images to retrieve similar images from vast data. This technology has significant applications …
View article: Temporally Dynamic Spiking Transformer Network for Speech Enhancement
Temporally Dynamic Spiking Transformer Network for Speech Enhancement Open
Speech enhancement (SE) aims to improve the quality and intelligibility of speech signals, particularly in the presence of noise or other distortions, to ensure reliable communication and robust speech recognition. Deep neural networks (DN…
View article: Sepsis Prediction Using CNNBDLSTM and Temporal Derivatives Feature Extraction in the IoT Medical Environment
Sepsis Prediction Using CNNBDLSTM and Temporal Derivatives Feature Extraction in the IoT Medical Environment Open
Background: Sepsis, a potentially fatal inflammatory disease triggered by infection, carries significant health implications worldwide.Timely detection is crucial as sepsis can rapidly escalate if left undetected.Recent advancements in dee…
View article: Digital Text Document Watermarking Based Tampering Attack Detection via Internet
Digital Text Document Watermarking Based Tampering Attack Detection via Internet Open
Owing to the rapid increase in the interchange of text information through internet networks, the reliability and security of digital content are becoming a major research problem.Tampering detection, Content authentication, and integrity …
View article: An enhanced tunicate swarm algorithm with deep-learning based rice seedling classification for sustainable computing based smart agriculture
An enhanced tunicate swarm algorithm with deep-learning based rice seedling classification for sustainable computing based smart agriculture Open
Smart agricultural techniques employ current information and communication technologies, leveraging artificial intelligence (AI) for effectually managing the crop. Recognizing rice seedlings, which is crucial for harvest estimation, tradi…
View article: Novel Framework for Autism Spectrum Disorder Identification and Tailored Education With Effective Data Mining and Ensemble Learning Techniques
Novel Framework for Autism Spectrum Disorder Identification and Tailored Education With Effective Data Mining and Ensemble Learning Techniques Open
Autism Spectrum Disorder (ASD) is a neurological condition that significantly affects cognitive abilities, language comprehension, object recognition, interpersonal skills, and communication capabilities. Its primary origin is genetic, and…
View article: A Novel Transfer Learning Approach for Detection of Pomegranates Growth Stages
A Novel Transfer Learning Approach for Detection of Pomegranates Growth Stages Open
Pomegranates are nutrient-rich fruits renowned for their vibrant ruby-red seeds and antioxidant properties. With a rich history rooted in various cultures, pomegranates have gained widespread popularity for their distinct flavor and potent…
View article: A Decentralized Approach to Smart Home Security: Blockchain With Red-Tailed Hawk-Enabled Deep Learning
A Decentralized Approach to Smart Home Security: Blockchain With Red-Tailed Hawk-Enabled Deep Learning Open
The fast development of smart home devices and the Internet of Things (IoTs) presents unprecedented accessibility into our day-to-day lives; however, it has also increased major problems regarding security and privacy. A smart home network…
View article: Roles of Blockchain in the Metaverse: Concepts, Taxonomy, Recent Advances, Enabling Technologies, and Open Research Issues
Roles of Blockchain in the Metaverse: Concepts, Taxonomy, Recent Advances, Enabling Technologies, and Open Research Issues Open
The Metaverse platform offers 3D immersive experiences through virtual reality, artificial intelligence, and blockchain technologies. Blockchain-based Metaverse has garnered recent interest due to its decentralization, anonymity, and other…
View article: Bayesian optimization with deep learning based pepper leaf disease detection for decision-making in the agricultural sector
Bayesian optimization with deep learning based pepper leaf disease detection for decision-making in the agricultural sector Open
Agricultural decision-making involves a complex process of choosing strategies and options to enhance resource utilization, overall productivity, and farming practices. Agricultural stakeholders and farmers regularly make decisions at var…