About
9
Publications
1,535
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
65
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (9)
BitTorrent is the most common protocol for file sharing nowadays. Due to its distributed nature, monitoring BitTorrent is a difficult task. Under this perception of anonymity, BitTorrent has motivated the rise of criminal activities such as copyright infringement or the sharing of stolen secret documents. This work-in-progress paper focuses on iden...
Technological developments over the past few decades have changed the way people communicate, with platforms like social media and blogs becoming vital channels for international conversation. Even though hate speech is vigorously suppressed on social media, it is still a concern that needs to be constantly recognized and observed. The Arabic langu...
Disaster-based tweets during an emergency consist of a variety of information on people who have been hurt or killed, people who are lost or discovered, infrastructure and utilities destroyed; this information can assist governmental and humanitarian organizations in prioritizing their aid and rescue efforts. It is crucial to build a model that can...
The automatic speech identification in Arabic tweets has generated substantial attention among academics in the fields of text mining and natural language processing (NLP). The quantity of studies done on this subject has experienced significant growth. This study aims to provide an overview of this field by conducting a systematic review of litera...
People are preoccupied with their own duties in today’s environment, making it tough to oversee and care for disabled people. Paralyzed and disabled people, on the other hand, have a powerful desire to move around freely. Different initiatives have been taken in the past to improve and preserve the self-esteem of such people, and various technologi...
The evolution of sophisticated deep learning algorithms such as Generative Adversarial Networks has made it possible to create deepfakes videos with convincing reality. Deepfake identification is important to address internet disinformation campaigns and lessen negative social media effects. Existing studies either use handcrafted features or deep...
Accurate diagnosis of the brain tumor type at an earlier stage is crucial for the treatment process and helps to save the lives of a large number of people worldwide. Because they are non-invasive and spare patients from having an unpleasant biopsy, magnetic resonance imaging (MRI) scans are frequently employed to identify tumors. The manual identi...
In this study, we have presented our findings on the deployment of a machine learning (ML) technique to enhance the performance of LTE applications employing quasi-Yagi-Uda antennas at 2100 MHz UMTS band. A number of techniques, including simulation, measurement, and a model of an RLC-equivalent circuit, are discussed in this article as ways to ass...
In recent times, we have seen an exponential rise in different chronic diseases due to our unhealthy lifestyles. Cardio disease is the most common and life-threatening among all diseases, which contributes to a very high mortality rate. Accurate detection of cardio disease at an early stage is vital to save the lives of people. Most of the existing...