Wael Alosaimi
YOU?
Author Swipe
View article: Novel 59-layer dense inception network for robust deepfake identification
Novel 59-layer dense inception network for robust deepfake identification Open
The exponential growth of Artificial Intelligence (AI) has led to the emergence of cutting edge methods and a plethora of new tools for media editing. The use of these tools has also facilitated the spread of false information, propaganda,…
View article: Social big data management through collaborative mobile, regional, and cloud computing
Social big data management through collaborative mobile, regional, and cloud computing Open
The crowd of smart devices surrounds us all the time. These devices popularize social media platforms (SMP), connecting billions of users. The enhanced functionalities of smart devices generate big data that overutilizes the mainstream net…
View article: Renewable energy driven on-road wireless charging infrastructure for electric vehicles in smart cities: A prototype design and analysis
Renewable energy driven on-road wireless charging infrastructure for electric vehicles in smart cities: A prototype design and analysis Open
View article: Selection of data analytic techniques by using fuzzy AHP TOPSIS from a healthcare perspective
Selection of data analytic techniques by using fuzzy AHP TOPSIS from a healthcare perspective Open
The healthcare industry has been put to test the need to manage enormous amounts of data provided by various sources, which are renowned for providing enormous quantities of heterogeneous information. The data are collected and analyzed wi…
View article: ArabBert-LSTM: improving Arabic sentiment analysis based on transformer model and Long Short-Term Memory
ArabBert-LSTM: improving Arabic sentiment analysis based on transformer model and Long Short-Term Memory Open
Sentiment analysis also referred to as opinion mining, plays a significant role in automating the identification of negative, positive, or neutral sentiments expressed in textual data. The proliferation of social networks, review sites, an…
View article: Analyzing the impact of quantum computing on IoT security using computational based data analytics techniques
Analyzing the impact of quantum computing on IoT security using computational based data analytics techniques Open
The Internet of Things (IoT) market is experiencing exponential growth, with projections increasing from 15 billion dollars to an estimated 75 billion dollars by 2025. Quantum computing has emerged as a key enabler for managing the rapid …
View article: OffshoringDSS: An Automated Tool of Application Maintenance Offshoring
OffshoringDSS: An Automated Tool of Application Maintenance Offshoring Open
The rapid spread of the internet over the last two decades has prompted more and more companies to deploy their work internationally. The offshoring strategy enables organizations to cut down costs, boost shareholder value, acquire a compe…
View article: Securing healthcare information system through fuzzy based decision-making methodology
Securing healthcare information system through fuzzy based decision-making methodology Open
The purpose of the healthcare Information System (HIS) is to replace the conventional method of data gathering and organization in hospitals into a modern method of systematic data collection, maintenance and dissemination. There has been …
View article: Impact analysis of keyword extraction using contextual word embedding
Impact analysis of keyword extraction using contextual word embedding Open
A document’s keywords provide high-level descriptions of the content that summarize the document’s central themes, concepts, ideas, or arguments. These descriptive phrases make it easier for algorithms to find relevant information quickly …
View article: An Empirical Investigation to Understand the Issues of Distributed Software Testing amid COVID-19 Pandemic
An Empirical Investigation to Understand the Issues of Distributed Software Testing amid COVID-19 Pandemic Open
Generally, software developers make errors during the distributed software development process; therefore, software testing delay is a significant concern. Some of the software mistakes are minor, but others may be costly or harmful. Since…
View article: Economic Denial of Sustainability Attacks Mitigation in the Cloud
Economic Denial of Sustainability Attacks Mitigation in the Cloud Open
Cyber security is one of the most attention seeking issues with the increasing advancement of technology specifically when the network availability is threaten by attacks such as Denial of Service attacks (DoS), Distributed DoS attacks (DD…
View article: Effectiveness Evaluation of Different IDSs Using Integrated Fuzzy MCDM Model
Effectiveness Evaluation of Different IDSs Using Integrated Fuzzy MCDM Model Open
Cyber-attacks are becoming progressively complicated; hence, the functional issues of intrusion-detection systems (IDSs) present ever-growing challenges. Failing to detect intrusions may jeopardize the trustworthiness of security services,…
View article: An Improved Binomial Distribution-Based Trust Management Algorithm for Remote Patient Monitoring in WBANs
An Improved Binomial Distribution-Based Trust Management Algorithm for Remote Patient Monitoring in WBANs Open
A wireless body area network (WBAN) is a technology that is widely employed in the medical sector. It is a low-cost network that allows for mobility and variation. It can be used for long-distance, semiautonomous remote monitoring without …
View article: MCBC-SMOTE: A Majority Clustering Model for Classification of營mbalanced Data
MCBC-SMOTE: A Majority Clustering Model for Classification of營mbalanced Data Open
Datasets with the imbalanced class distribution are difficult to handle with the standard classification algorithms. In supervised learning, dealing with the problem of class imbalance is still considered to be a challenging research probl…
View article: Event Study: Advanced Machine Learning and Statistical Technique for Analyzing Sustainability in Banking Stocks
Event Study: Advanced Machine Learning and Statistical Technique for Analyzing Sustainability in Banking Stocks Open
Machine learning has grown in popularity in recent years as a method for evaluating financial text data, with promising results in stock price projection from financial news. Various research has looked at the relationship between news eve…
View article: A quantization assisted U-Net study with ICA and deep features fusion for breast cancer identification using ultrasonic data
A quantization assisted U-Net study with ICA and deep features fusion for breast cancer identification using ultrasonic data Open
Breast cancer is one of the leading causes of death in women worldwide—the rapid increase in breast cancer has brought about more accessible diagnosis resources. The ultrasonic breast cancer modality for diagnosis is relatively cost-effect…
View article: The Evaluation of Software Security through Quantum Computing Techniques: A Durability Perspective
The Evaluation of Software Security through Quantum Computing Techniques: A Durability Perspective Open
The primary goal of this research study, in the field of information technology (IT), is to improve the security and durability of software. A quantum computing-based security algorithm springs quite a lot of symmetrical approaches and pro…
View article: Analyzing the Impact of Cyber Security Related Attributes for Intrusion Detection Systems
Analyzing the Impact of Cyber Security Related Attributes for Intrusion Detection Systems Open
Machine learning (ML) is one of the dominating technologies practiced in both the industrial and academic domains throughout the world. ML algorithms can examine the threats and respond to intrusions and security incidents swiftly in an in…
View article: Machine Health Surveillance System by Using Deep Learning Sparse Autoencoder
Machine Health Surveillance System by Using Deep Learning Sparse Autoencoder Open
Deep learning is a rapidly growing research area having state of art achievement in various applications including but not limited to speech recognition, object recognition, machine translation, and image segmentation. In the current moder…
View article: Evaluating the Impacts of Security-Durability Characteristic: Data Science Perspective
Evaluating the Impacts of Security-Durability Characteristic: Data Science Perspective Open
Security has always been a vital research topic since the birth of web application. A great deal of research has been conducted to determine the ways of identifying and classifying security issues or goals However, in the recent years, it …
View article: An Intelligent Forecasting Model for Disease Prediction Using Stack Ensembling Approach
An Intelligent Forecasting Model for Disease Prediction Using Stack Ensembling Approach Open
This research work proposes a new stack-based generalization ensemble model to forecast the number of incidences of conjunctivitis disease. In addition to forecasting the occurrences of conjunctivitis incidences, the proposed model also im…
View article: Toward a Unified Model Approach for Evaluating Different Electric Vehicles
Toward a Unified Model Approach for Evaluating Different Electric Vehicles Open
Considering rising pollution as well as fuel expenses, it has now become critical to transition to a sustainable method of transportation. As a result, automakers have begun to spend on research and development in the electric vehicle (EV)…
View article: Analyzing the Data of Software Security Life-Span: Quantum Computing Era
Analyzing the Data of Software Security Life-Span: Quantum Computing Era Open
Software or web application security is the main objective in the era of Information Technology (IT) and Artificial Intelligence (AI). Distinguishing proof of security at the initial stage produces significant results to comprehend the adm…
View article: Enhancing Security in Internet of Things Environment by Developing an Authentication Mechanism using COAP Protocol
Enhancing Security in Internet of Things Environment by Developing an Authentication Mechanism using COAP Protocol Open
Internet of Things (IoT) has a huge attention recently due to its new emergence, benefits, and contribution to improving the quality of human lives. Securing IoT poses an open area of research, as it is the base of allowing people to use t…
View article: Evaluating the Impact of Different Symmetrical Models of Ambient Assisted Living Systems
Evaluating the Impact of Different Symmetrical Models of Ambient Assisted Living Systems Open
In recent years, numerous attempts have been made to enhance the living standard for old-aged people. Ambient Assisted Living (AAL) is an evolving interdisciplinary field aimed at the exploitation of knowledge and communication technology …
View article: A Link Analysis Algorithm for Identification of Key Hidden Services
A Link Analysis Algorithm for Identification of Key Hidden Services Open
The Tor dark web network has been reported to provide a breeding ground for criminals and fraudsters who are exploiting the vulnerabilities in the network to carry out illicit and unethical activities. The network has unfortunately become …
View article: Quality of Service Aware Cluster Routing in Vehicular Ad Hoc Networks
Quality of Service Aware Cluster Routing in Vehicular Ad Hoc Networks Open
In vehicular ad hoc networks (VANETs), the topology information (TI) is updated frequently due to vehicle mobility. These frequent changes in topology increase the topology maintenance overhead. To reduce the control message overhead, clus…
View article: Computational Technique for Effectiveness of Treatments Used in Curing SARS-CoV-2
Computational Technique for Effectiveness of Treatments Used in Curing SARS-CoV-2 Open
COVID-19 pandemic has unleashed an unprecedented humanitarian crisis in the world at present. With each passing day, the number of patients afflicted with Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) is rising at an alarmin…
View article: Real‐Time System Prediction for Heart Rate Using Deep Learning and Stream Processing Platforms
Real‐Time System Prediction for Heart Rate Using Deep Learning and Stream Processing Platforms Open
Low heart rate causes a risk of death, heart disease, and cardiovascular diseases. Therefore, monitoring the heart rate is critical because of the heart’s function to discover its irregularity to detect the health problems early. Rapid tec…
View article: PeachNet: Peach Diseases Detection for Automatic Harvesting
PeachNet: Peach Diseases Detection for Automatic Harvesting Open
To meet the food requirements of the seven billion people on Earth, multiple advancements in agriculture and industry have been made. The main threat to food items is from diseases and pests which affect the quality and quant... | Find, re…