Mohammed Aljebreen
YOU?
Author Swipe
View article: Privacy preserving blockchain integrated explainable artificial intelligence with two tier optimization for cyber threat detection and mitigation in the internet of things
Privacy preserving blockchain integrated explainable artificial intelligence with two tier optimization for cyber threat detection and mitigation in the internet of things Open
View article: Advancements in Automated Cheating Detection Systems for Online and In-Person Examinations: A Comprehensive Review of Methods, Technologies, and Effectiveness
Advancements in Automated Cheating Detection Systems for Online and In-Person Examinations: A Comprehensive Review of Methods, Technologies, and Effectiveness Open
Authenticity of tests as a measurement tool has received a lot of attention within learning institutions due to emergences of online classes and remote test administration. Supervision and invigilation methods do not always suffice to dete…
View article: Enhanced intrusion detection in cybersecurity through dimensionality reduction and explainable artificial intelligence
Enhanced intrusion detection in cybersecurity through dimensionality reduction and explainable artificial intelligence Open
View article: Explainable artificial intelligence-based cyber resilience in internet of things networks using hybrid deep learning with improved chimp optimization algorithm
Explainable artificial intelligence-based cyber resilience in internet of things networks using hybrid deep learning with improved chimp optimization algorithm Open
View article: Two stage malware detection model in internet of vehicles (IoV) using deep learning-based explainable artificial intelligence with optimization algorithms
Two stage malware detection model in internet of vehicles (IoV) using deep learning-based explainable artificial intelligence with optimization algorithms Open
View article: Advanced smart assistance with enhancing social interaction and daily activities for visually impaired individuals using deep learning with modified seagull optimization
Advanced smart assistance with enhancing social interaction and daily activities for visually impaired individuals using deep learning with modified seagull optimization Open
View article: Corrigendum to “Hybrid Sine-Cosine Chimp optimization based feature selection with deep learning model for threat detection in IoT sensor networks” [Alex. Eng. J. 102 (2024) 169-178]
Corrigendum to “Hybrid Sine-Cosine Chimp optimization based feature selection with deep learning model for threat detection in IoT sensor networks” [Alex. Eng. J. 102 (2024) 169-178] Open
View article: SECURING INTERNET OF THINGS-ASSISTED CONSUMER ELECTRONICS USING BLOCKCHAIN WITH DEEP LEARNING-BASED USER AUTHENTICATION
SECURING INTERNET OF THINGS-ASSISTED CONSUMER ELECTRONICS USING BLOCKCHAIN WITH DEEP LEARNING-BASED USER AUTHENTICATION Open
Internet of Things (IoT)-assisted consumer electronics refer to common devices that are improved with IoT technology, allowing them to attach to the internet and convey with other devices. These smart devices contain smart home systems, sm…
View article: ENHANCING CYBERSECURITY VIA ANOMALY RECOGNITION USING THERMAL EXCHANGE FRACTALS OPTIMIZATION WITH DEEP LEARNING ON IOT NETWORKS
ENHANCING CYBERSECURITY VIA ANOMALY RECOGNITION USING THERMAL EXCHANGE FRACTALS OPTIMIZATION WITH DEEP LEARNING ON IOT NETWORKS Open
The Internet of Things (IoT) refers to the interconnected network of objects and devices that seamlessly communicate and share information. The need for robust cybersecurity measures becomes paramount with the increase of IoT devices, rang…
View article: HYBRID DEEP LEARNING ALGORITHM FOR FRACTAL HUMAN ACTIVITY RECOGNITION USING SMART IOT-EDGE-CLOUD CONTINUUM
HYBRID DEEP LEARNING ALGORITHM FOR FRACTAL HUMAN ACTIVITY RECOGNITION USING SMART IOT-EDGE-CLOUD CONTINUUM Open
Human activity recognition (HAR) employs a broad range of sensors that generate massive volumes of data. Traditional server-based and cloud computing methods require all sensor data to be sent to servers or clouds for processing, which lea…
View article: Sandpiper optimization with hybrid deep learning model for blockchain-assisted intrusion detection in iot environment
Sandpiper optimization with hybrid deep learning model for blockchain-assisted intrusion detection in iot environment Open
Intrusion detection in the Internet of Things (IoTs) is a vital unit of IoT safety. IoT devices face diverse kinds of attacks, and intrusion detection systems (IDSs) play a significant role in detecting and responding to these threats. A t…
View article: Explainable artificial intelligence in web phishing classification on secure IoT with cloud-based cyber-physical systems
Explainable artificial intelligence in web phishing classification on secure IoT with cloud-based cyber-physical systems Open
IoT is the technology that aids the interconnection of all kinds of devices over the internet to replace data, monitor devices and enhance actuators to create outcomes. Cyber-physical systems (CPS) contain control and computation component…
View article: Hybrid Sine-Cosine Chimp optimization based feature selection with deep learning model for threat detection in IoT sensor networks
Hybrid Sine-Cosine Chimp optimization based feature selection with deep learning model for threat detection in IoT sensor networks Open
Internet of Things (IoT) sensor networks are connected systems of physical devices set with actuators, sensors, and communication abilities, allowing them to gather, spread, and exchange information with centralized methods. These networks…
View article: Correction: Computational Linguistics Based Arabic Poem Classification and Dictarization Model
Correction: Computational Linguistics Based Arabic Poem Classification and Dictarization Model Open
View article: Computational Linguistics Based Arabic Poem Classification and Dictarization Model
Computational Linguistics Based Arabic Poem Classification and Dictarization Model Open
Computational linguistics is the scientific and engineering discipline related to comprehending written and spoken language from a computational perspective and building artefacts that effectively process and produce language, either in bu…
View article: Enhancing cybersecurity in cloud-assisted Internet of Things environments: A unified approach using evolutionary algorithms and ensemble learning
Enhancing cybersecurity in cloud-assisted Internet of Things environments: A unified approach using evolutionary algorithms and ensemble learning Open
Internet of Things (IoT) security is an umbrella term for the strategies and tools that protect devices connected to the cloud, and the network they use to connect. The IoT connects different objects and devices through the internet to co…
View article: Chaotic Equilibrium Optimizer-Based Green Communication With Deep Learning Enabled Load Prediction in Internet of Things Environment
Chaotic Equilibrium Optimizer-Based Green Communication With Deep Learning Enabled Load Prediction in Internet of Things Environment Open
Currently, there is an emerging requirement for applications related to the Internet of Things (IoT). Though the capability of IoT applications is huge, there are frequent limitations namely energy optimization, heterogeneity of devices, m…
View article: Multi-Objective Seagull Optimization Algorithm with Deep Learning-Enabled Vulnerability Detection for Secure Cloud Environments
Multi-Objective Seagull Optimization Algorithm with Deep Learning-Enabled Vulnerability Detection for Secure Cloud Environments Open
Cloud computing (CC) is an internet-enabled environment that provides computing services such as networking, databases, and servers to clients and organizations in a cost-effective manner. Despite the benefits rendered by CC, its security …
View article: Exploiting Remote Sensing Imagery for Vehicle Detection and Classification Using an Artificial Intelligence Technique
Exploiting Remote Sensing Imagery for Vehicle Detection and Classification Using an Artificial Intelligence Technique Open
Remote sensing imagery involves capturing and examining details about the Earth’s surface from a distance, often using satellites, drones, or other aerial platforms. It offers useful data with which to monitor and understand different phen…
View article: Hybrid Muddy Soil Fish Optimization-Based Energy Aware Routing in IoT-Assisted Wireless Sensor Networks
Hybrid Muddy Soil Fish Optimization-Based Energy Aware Routing in IoT-Assisted Wireless Sensor Networks Open
The seamless operation of interconnected smart devices in wireless sensor networks (WSN) and the Internet of Things (IoT) needs continuously accessible end-to-end routes. However, the sensor node (SN) relies on a limited power source and t…
View article: Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks
Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks Open
An Internet of Things (IoT)-assisted Wireless Sensor Network (WSNs) is a system where WSN nodes and IoT devices together work to share, collect, and process data. This incorporation aims to enhance the effectiveness and efficiency of data …
View article: Blockchain-Driven Image Encryption Process with Arithmetic Optimization Algorithm for Security in Emerging Virtual Environments
Blockchain-Driven Image Encryption Process with Arithmetic Optimization Algorithm for Security in Emerging Virtual Environments Open
The real world is bounded by people, hospitals, industries, buildings, businesses, vehicles, cognitive cities, and billions of devices that offer various services and interact with the world. Recent technologies, including AR, VR, XR, and …
View article: Political Optimizer with Probabilistic Neural Network-Based Arabic Comparative Opinion Mining
Political Optimizer with Probabilistic Neural Network-Based Arabic Comparative Opinion Mining Open
Opinion Mining (OM) studies in Arabic are limited though it is one of the most extensively-spoken languages worldwide. Though the interest in OM studies in the Arabic language is growing among researchers, it needs a vast number of investi…
View article: Quantum Particle Swarm Optimization with Deep Learning-Based Arabic Tweets Sentiment Analysis
Quantum Particle Swarm Optimization with Deep Learning-Based Arabic Tweets Sentiment Analysis Open
Sentiment Analysis (SA), a Machine Learning (ML) technique, is often applied in the literature. The SA technique is specifically applied to the data collected from social media sites. The research studies conducted earlier upon the SA of t…
View article: Modified Sine Cosine Optimization with Adaptive Deep Belief Network for Movie Review Classification
Modified Sine Cosine Optimization with Adaptive Deep Belief Network for Movie Review Classification Open
Sentiment analysis (SA) is a growing field at the intersection of computer science and computational linguistics that endeavors to automatically identify the sentiment presented in text. Computational linguistics aims to describe the funda…
View article: Multi-Versus Optimization with Deep Reinforcement Learning Enabled Affect Analysis on Arabic Corpus
Multi-Versus Optimization with Deep Reinforcement Learning Enabled Affect Analysis on Arabic Corpus Open
Sentiment analysis (SA) of the Arabic language becomes important despite scarce annotated corpora and confined sources. Arabic affect Analysis has become an active research zone nowadays. But still, the Arabic language lags behind adequate…
View article: Optimal Deep Hybrid Boltzmann Machine Based Arabic Corpus Classification Model
Optimal Deep Hybrid Boltzmann Machine Based Arabic Corpus Classification Model Open
Natural Language Processing (NLP) for the Arabic language has gained much significance in recent years. The most commonly-utilized NLP task is the ‘Text Classification’ process. Its main intention is to apply the Machine Learning (ML) appr…
View article: Gender Identification Using Marginalised Stacked Denoising Autoencoders on Twitter Data
Gender Identification Using Marginalised Stacked Denoising Autoencoders on Twitter Data Open
Gender analysis of Twitter could reveal significant socio-cultural differences between female and male users. Efforts had been made to analyze and automatically infer gender formerly for more commonly spoken languages’ content, but, as we …
View article: Improved Bald Eagle Search Optimization with Synergic Deep Learning-Based Classification on Breast Cancer Imaging
Improved Bald Eagle Search Optimization with Synergic Deep Learning-Based Classification on Breast Cancer Imaging Open
Medical imaging has attracted growing interest in the field of healthcare regarding breast cancer (BC). Globally, BC is a major cause of mortality amongst women. Now, the examination of histopathology images is the medical gold standard fo…
View article: Modelling of Metaheuristics with Machine Learning-Enabled Cybersecurity in Unmanned Aerial Vehicles
Modelling of Metaheuristics with Machine Learning-Enabled Cybersecurity in Unmanned Aerial Vehicles Open
The adoption and recent development of Unmanned Aerial Vehicles (UAVs) are because of their widespread applications in the private and public sectors, from logistics to environment monitoring. The incorporation of 5G technologies, satellit…