Basem Assiri

Basem Assiri
  • Doctor of Philosophy
  • Dean at Jazan University

About

39
Publications
5,761
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
317
Citations
Introduction
Current institution
Jazan University
Current position
  • Dean

Publications

Publications (39)
Article
Full-text available
The development of blockchain technology has facilitated its application in many areas of life due to its ability to enable decentralization in processing and storage. To support blockchain's application in various fields, its algorithms, and consensus protocols should be developed. Nowadays, there are many consensus protocols, each of which can be...
Article
Full-text available
The accurate prediction of cryptocurrency prices is crucial due to the volatility and complexity of digital asset markets, which pose significant challenges to traders, investors, and researchers. This research addresses these challenges by leveraging machine learning and deep learning techniques to forecast closing prices for cryptocurrencies, foc...
Article
Full-text available
Recently, distributed systems have become the backbone of technological development. It serves as the foundation for new trends technologies such as blockchain, the internet of things and others. A distributed system provides fault tolerance and decentralization, where a fault in any component does not result in a whole system failure. In addition,...
Article
Full-text available
Introduction Machine learning (ML) algorithms and statistical modeling offer a potential solution to offset the challenge of diagnosing early Alzheimer's disease (AD) by leveraging multiple data sources and combining information on neuropsychological, genetic, and biomarker indicators. Among others, statistical models are a promising tool to enhanc...
Article
Full-text available
The automatic detection of fires and the determination of their causes play a crucial role in mitigating the catastrophic consequences of such events. The literature reveals substantial research on automatic fire detection using machine learning models. However, once a fire is detected, there is a notable gap in the literature concerning the automa...
Article
Full-text available
Brain tumors occur due to the expansion of abnormal cell tissues and can be malignant (cancerous) or benign (not cancerous). Numerous factors such as the position, size, and progression rate are considered while detecting and diagnosing brain tumors. Detecting brain tumors in their initial phases is vital for diagnosis where MRI (magnetic resonance...
Article
Full-text available
Hyperspectral imagery, capturing information beyond the visible spectrum, is essential for many remote sensing applications. This paper introduces a novel approach utilizing a 3D Convolutional Neural Network (CNN) enhanced with self-attention mechanism to address the limitations of traditional architectures in hyperspectral image classification. Th...
Article
Full-text available
Blockchain is a developing technology that promises advancements when it is applied to other fields. Applying blockchain to other systems requires a customized blockchain model to satisfy the requirements of different application fields. One important area is to integrate blockchain with smart spaces and the Internet of Things to process, manage, a...
Article
Full-text available
Blockchain enhances the development of other technologies and systems by providing more transparency, sharing, decentralization, security, and privacy. Blockchain has many applications that enable integration and application in many areas, such as the field of ambient assisted living (AAL). However, blockchain includes many processes for data propo...
Article
Full-text available
Blockchain technology is a decentralized and secure paradigm for data processing, sharing, and storing. It relies on consensus protocol for all decisions, which focuses on computational and resource capability. For example, proof of work (PoW) and proof of stake (PoS) are the most famous consensus protocols that are currently used. However, these c...
Article
Full-text available
The progress of technology has played a crucial role in enhancing various fields such as education. Universities in Saudi Arabia offer free education to students and follow specific admission policies. These policies usually focus on features and scores such as the high school grade point average, general aptitude test, and achievement test. The ma...
Article
Full-text available
The development of e-healthcare systems requires the application of advanced technologies, such as blockchain technology. The main challenge of applying blockchain technology to e-healthcare is to handle the impact of the delay that results from blockchain procedures during the communication and voting phases. The impacts of latency in blockchains...
Article
Full-text available
Over time for the past few years, facial expression identification has been a promising area. However, darkness, lighting conditions, and other factors make facial emotion identification challenging to detect. As a result, thermal images are suggested as a solution to such problems and for a variety of other benefits. Furthermore, focusing on signi...
Article
Full-text available
The automatic facial expression tracking method has become an emergent topic during the last few decades. It is a challenging problem that impacts many fields such as virtual reality, security surveillance, driver safety, homeland security, human-computer interaction, medical applications. A remarkable cost-efficiency can be achieved by considering...
Article
Full-text available
This paper deals with decomposition of complete graphs on n vertices into circulant graphs with reduced degree r < n-1. They are denoted as Cn(a1, a2,..., am), where a1 to am are generators. Mathematical labeling for such bigger (higher order and huge size) and complex (strictly regular with so many triangles) graphs is very difficult. That is why...
Article
Full-text available
In recent decades, the communication of electronic equipment and physical resources is combined. Internet of Things (IoT) distributes things widely in the network. The IoT is Internet-based pervasive computing, which created significant development in the recent disposition of IoT infrastructures. The IoT infrastructures lead, manage and generate l...
Chapter
The construction of Mapper has emerged in the last decade as a powerful and effective topological data analysis tool that approximates and generalizes other topological summaries, such as the Reeb graph, the contour tree, split, and joint trees. In this paper we study the parallel analysis of the construction of Mapper. We give a provably correct p...
Preprint
The rise of blockchain technology within a few years has attracted researchers across the world. The prime reason for worldwide attention is undoubtedly due to its feature of immutability along with the decentralized approach of data protection. As this technology is progressing, lots of developments in terms of identifying new applications, blockc...
Article
Full-text available
A vertex labeling φ : V (G) → {1, 2,. .. , k} is called an edge irregular k-labeling of a graph G if all edges in G have unique weights. The weight of an edge is defined as the sum of the labels of its incident vertices. The minimum k for which the graph G has an edge irregular k-labeling is called the edge irregularity strength of G, denoted by es...
Article
Tracking and authentication at a low cost and in a convenient way is an important issue nowadays as opposed to using high cost for specified hardware and complex calibration process. In the paper, the prime concentration is divided into two: (i) eye tracking and (ii) parallelism in execution. First part has been subdivided as: Firstly, human face i...
Article
Full-text available
In Transactional Memory each shared object can be accessed by concurrent transactions which may cause conflicts and aborts. Opacity is a precise consistency property which maps a concurrent execution to a legal sequential execution that preserves the real time order of events. However, having precise consistency in large scale network and database...
Article
Full-text available
The construction of Mapper has emerged in the last decade as a powerful and effective topological data analysis tool that approximates and generalizes other topological summaries, such as the Reeb graph, the contour tree, split, and joint trees. In this paper, we study the parallel analysis of the construction of Mapper. We give a provably correct...

Network

Cited By