About
24
Publications
7,210
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
336
Citations
Introduction
Current institution
Publications
Publications (24)
In recent years, Arabic natural language processing has achieved remarkable advancements, particularly with the advent of large language models that have enhanced the analysis of diverse Arabic texts, including literary and artistic works such as poetry. However, these models encounter specific challenges when dealing with Arabic poetry, which is c...
The emergence of 6G cognitive radio IoT networks introduces both opportunities and complexities in spectrum access and security. Blockchain technology has emerged as a viable solution to address these challenges, offering enhanced security, transparency, and efficiency in spectrum management. This survey paper offers a thorough analysis of recent a...
Accurate and timely diagnosis of pulmonary diseases is critical in the field of medical imaging. While deep learning models have shown promise in this regard, the current methods for developing such models often require extensive computing resources and complex procedures, rendering them impractical. This study focuses on the development of a light...
Despite the increasing reliance on the Internet of Things (IoT) as a basic infrastructure for future applications. Integrating blockchain technology with IoT extensively helps provide basic security requirements owing to the built-in security structure of the blockchain. Healthcare IoT applications are one of the industries that will be revolutioni...
Presents corrections to the paper, (Correction to “Blockchain-IoT Healthcare Applications and Trends: A Review”).
Websites can improve their security and protect against harmful Internet attacks by incorporating CAPTCHA verification, which assists in distinguishing between human users and robots. Among the various types of CAPTCHA, the most prevalent variant involves text-based challenges that are intentionally designed to be easily understandable by humans wh...
The Internet of Things (IoT) is emerging from its infancy and establishing itself as a component of the future Internet. However, the ability to manage a huge number of IoT devices is one of the IoT technical challenges. To implement access control, traditional schemes typically rely on a trusted central organization. Traditional centralized access...
Blockchain has recently attracted significant academic attention in research fields beyond the financial industry. In the Internet of Things (IoT), blockchain can be used to create a decentralized, reliable, and secure environment. The use of blockchain in IoT applications is still in its early stages, particularly at the low end of the computing s...
Software testing is a vital part of software engineering process. Automated testing makes this process more accurate and more efficient. Due to the large number and the variety of testing tools, a comprehensive taxonomy of these features is necessary. This research aims at developing a comprehensive taxonomy for testing tools to help software devel...
In recent times, Human activity recognition (HAR) becomes a major challenging issue among computer vision applications in day to day lives. The HAR is mainly envisioned to be utilized with other technologies, namely Internet of Things (IoT) and sensor technologies. Due to the advancements of deep learning (DL) approaches, automated high level featu...
Proactive is one main aspect of ubiquitous context-aware systems in IoT environment. Ubiquitous context-aware systems in IoT environment needs a light-weight intelligent prediction techniques especially within fog and edge computing environment where technologies capabilities are poor. On the other hand, the data that ubiquitous context-aware syste...
During testing of programs, developers face two types of errors: syntax errors, and logical errors. Generally, logical errors in programming are more difficult to detect. To figure out the reason of that errors, it should trace the source code manually to find the potential instructions that may cause the problem. Consequently the testing will spen...
Due to the ever-increasing number and diversity of data sources, and the continuous flow of data that are inevitably redundant and unused to the cloud, the Internet of Things (IoT) brings several problems including network bandwidth, the consumption of network energy, cloud storage, especially for paid volume, and I/O throughput as well as handling...
Abstract
Purpose – This paper aims to introduce a comprehensive framework for quality of context in pervasive
context-aware systems. The framework includes the context quality characteristics, the quality policy, the
quality calculation methods and the quality control algorithm.
Design/methodology/approach – This study used the constructive researc...
Context-aware Systems (CASs) are becoming increasingly popular and can be found in the areas of wearable computing, mobile computing, robotics, adaptive and intelligent user interfaces. Sensors are the corner stone of context capturing however, sensed context data are commonly prone to imperfection due to the technical limitations of sensors, their...
In Pervasive computing environment, context-aware systems face many challenges to keep high quality performance. One-challenge faces context-aware systems is conflicted values come from different sensors because of different reasons. These conflicts affect the quality of context and as a result the quality of service as a whole. This paper is exten...
In Pervasive computing environment, context-aware systems face many challenges to keep high quality performance. One-challenge faces context-aware systems is conflicted values come from different sensors because of different reasons. These conflicts affect the quality of context and as a result the quality of service as a whole. This paper is exten...
The first step for determining the quality of context
(QoC) in context aware systems (CASs) is to make sure that
there are no conflicts among the values of each context element
collected from different resources/sensors. This work is an
extension of our approach RCCAR (
Resolving Context
Conflicts Using Association Rules
) which proposes a solution...
Context-aware systems (CASs) face many challenges to keep high quality performance. One challenge faces CASs is conflicted values come from different sensors because of different reasons. These conflicts affect the quality of context (QoC) and as a result the quality of service as a whole. This paper conducts a novel approach called RCCAR resolves...
This paper presents an applied study in data mining and knowledge discovery. It aims at discovering patterns within historical students' academic and financial data at UST (University of Science and Technology) from the year 1993 to 2005 in order to contribute improving academic performance at UST. Results show that these rules concentrate on three...