
Bassam Al-Shargabi- Ph.D
- Professor (Associate) at Cardiff Metropolitan University
Bassam Al-Shargabi
- Ph.D
- Professor (Associate) at Cardiff Metropolitan University
About
62
Publications
29,471
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
709
Citations
Introduction
Current institution
Additional affiliations
September 2018 - August 2023
December 2009 - September 2010
October 2010 - August 2018
Publications
Publications (62)
We are witnessing the era of Internet of Things (IoT), where its applications such as smart cities and smart homes catch sensitive data gathered mostly by IoT surveillance cameras among other sensors or devices. Therefore, security and privacy protection is a key concern during transmitting such sensitive data across the IoT network to be processed...
Recently, developing an Automatic Essays Grading (AEG) system has become an attractive topic in industry and academia. Most of the grading systems rely on machine learning to grade the essays based on a predetermined dataset. However, English essays scored based on Automated Student Assessment Prize (ASAP) dataset whereas the absence of such a data...
Many lightweight encryption algorithms have been developed for tackling the limitations of resources on the Internet of Things (IoT) devices. Such devices have limited processing capabilities in terms of speed, storage, and memory. In this paper, we designed and implemented a flexible lightweight encryption system with strong and simple substitutio...
The need for a reliable and fast encryption algorithm to encrypt medical data for patients is an extremely important topic to be considered especially during pandemic times such as the pandemic COVID 19. This pandemic forced governments and healthcare institutions to monitor COVID 19 patients. All the patient's data or records are also shared among...
Background
The e-learning system has gained a phenomenal significance than ever before in the present COVID-19 crisis. The E-learning delivery mechanisms have evolved to enhanced levels facilitating the education delivery with greater penetration and access to mass student population worldwide. Nevertheless, there is still scope to conduct further...
The rapid proliferation of Internet of Things (IoT) devices in healthcare, from wearable sensors to implantable medical devices, has revolutionised patient monitoring, personalised treatment, and remote care delivery. However, the resource-constrained nature of IoT devices, coupled with the sensitivity of medical data, presents critical security ch...
Purpose
This study aims to examine the present condition of blockchain technology (BT) applications in auditing by analyzing journal publications on the topic to acquire a better understanding of the field.
Design/methodology/approach
This study makes use of the Bibliometric Analysis method and gathered 725 papers from the Web of Science and Scopu...
The information revolution has transformed higher education. After the COVID-19 pandemic, teachers and instructors were encouraged to improve technology-enhanced teaching methods. Furthermore, various factors influenced the adoption of internet and digital-based technologies as an aspect of teaching methodology, including its usefulness, ease of us...
The data generated by the applications of the internet of things (IoT) that transmit sensitive and secret information via wireless sensor networks (WSN) must be safeguarded as major components of any cyber physical system (CPS). Interconnected devices, such as IoT devices or objects are viewed as constrained because they lack adequate computational...
Nowadays, with the widespread of the Internet of Things (IoT) applications in every aspect of our lives. It’s urgent to protect the sensitive data such as images generated by IoT devices transmitted through the wireless network. Furthermore, IoT devices are considered constraint devices regarding limited computation resources such as processing and...
The Internet of Things (IoT) technology found many applications in the healthcare sector. Through the collection of vital data, IoT plays a crucial role are automating manual tasks and improving patient outcomes. This paper provides an overview of the impact and challenges of IoT architectures and applications in healthcare. The paper identifies th...
Smart phones and tablets have turned into an indispensable piece in our society. Accordingly, these devices are equipped with many sensors that can be exploited in many applications such as monitoring road surface condition. It becomes important to find an optimal method for detecting road speed bumps and potholes in order to monitor the road condi...
The new advances of the Internet of Things (IoT) technology can be utilized to promote service delivery in several real-life applications such as healthcare systems. The Routing Protocol for Low Power and Loss Network (RPL) is a routing protocol designed to serve as a proper routing protocol for packets in Wireless Sensor Networks (WSN). Among the...
The new advances of the Internet of Things (IoT) technology can be utilized to promote service delivery in several real-life applications such as the healthcare systems. The Routing Protocol for Low Power and Loss Network (RPL) is a routing protocol designed to serve as a proper routing protocol for packets in Wireless Sensor Networks (WSN). Among...
Big Data courses in which students are asked to carry out Big Data projects are becoming more frequent as a part of University Engineering curriculum. In these courses, instructors and students must face a series of special characteristics, difficulties and challenges that it is important to know about beforehand, so the lecturer can better plan th...
Education institutions continue to hunt for chances of enhancing the methods of operating and managing their resources. Cloud computing is a modern technology which promises to present opportunities for delivering a wild range of computing services such as software, platform, and infrastructure; in a way that has not been practiced before. Integrat...
Nowadays, Cloud Computing and Web services are the main backbone of e-government applications because of its interoperability and accessibility nature. Web services that are maintained in Cloud brought much attention in research and industry in terms of securing the communicated Web services. Thus, securing and trusting between the communicated Web...
Breast Cancer has turned into a typical disease around the globe and harvesting the life of young women and the main source of cancer death and caused 22.9% of a wide range of cancers in women. The development of massive breast cancer screening has led to earlier diagnosis and rapid management with a significant improvement in survival rate. The pr...
An Automated Essay Grading (AEG) system is designed to be used in universities, companies and schools, which depends on Artificial Intelligence and Natural Language Processing technologies; as it has the capability to improve the grading system in terms of overcoming cost, time and teacher effort while correcting the students’ essay questions and p...
Breast cancer (BC) is a standout disease of the most well-known cancers among women around the world. The analysis and prediction of BC leads to early manage the disease and protect the patients from further medical complications. In the light of its noticeable focal points in basic highlights identification from complex BC datasets, Machine Learni...
The idea of using the Cloud of Things is becoming more critical for e-government, as it is considered to be a useful mechanism of facilitating the government’s work. The most important benefit of using the Cloud of Things concept is the increased productivity that the e-governments would achieve; which eventually would lead to significant cost savi...
The idea of using the Cloud of Things is becoming more critical for e-government, as it is considered to be a useful mechanism of facilitating the government's work. The most important benefit of using the Cloud of Things concept is the increased productivity that the e-governments would achieve; which eventually would lead to significant cost savi...
Background
Cloud Computing has drawn much attention in the industry due to its costefficient schema along with more prospects, such as elasticity and scalability nature of Cloud Computing. One of the main service models of a Cloud is software as a service, where many web services are published and hosted in the Cloud environment. Many web services...
Cloud Computing has drawn much attention in industry due its efficient cost schema along with more prospects such as elasticity and scalability nature of Cloud Computing. One of the main service model of Cloud is Software as Service, where many Web services are published and hosted in Cloud. Many Web Services in Cloud offers the same functionality...
The recent development in the information and Communication industry is having a tremendous impact over the education industry. With the advent of technologies like e-learning and M-learning institutions have started to embrace these technologies. Various factors and issues influences the adoption and acceptance use of M-learning that must be studi...
The visual extraction of cellular, nuclear and tissue components from medical images is very vital in the diagnosis routine of different health related abnormalities and diseases. The objective of this work is to modify and efficiently combine different image processing methods supported by cascaded artificial neural networks in an automated system...
Equalizing energy consumption among sensor nodes
within Wireless Sensor Networks (WSNs) is an important
technique that can be used to prolong the network lifetime.
Routing Protocol for Low Energy and Lossy networks (RPL) is a
dedicated protocol for this type of networks of poor energy
resources. In RPL there is only one routing metric that can be
u...
Process and continuous process improvement is a very important aspect in Web-based software development organizations to meet the cost effective objectives of organizations. Despite the importance of Software Process Improvement (SPI), there is enough evidence that the majority of Web-based software development organizations are facing major obstac...
Management Information Systems (MIS) does not only include information systems, rather than a look to the entire business processes and resources that are directed toward pulling information from functional or tactical systems. Many challenges are facing organization when implementing and managing MIS system and projects. This paper aimed to explor...
An enhanced e-learning network based on integration between cloud environment and Web is probably suggested for the existing and upcoming e-learning tools that are considered as Software as a Service (SaaS). This paper examines three most recent patents that were awarded between February 2012 and May 2014 in the area of e-learning. In addition, we...
the motivation behind this chapter is that Service Oriented architecture issued to compose an application as a set of services that are language and platform independent, communicate with each other, Therefore, user preferences rules in web service composition process plays crucial role and has opened a wide spectrum of challenge, In this chapter,...
Many key challenges influence on the use of Arabic information retrieval systems, one of these is the performance of the Arabic information retrieval systems in terms of precision and recall. In this paper, we present the Genetic Algorithms to improve performance of Arabic information retrieval system based on vector space model. The main idea in t...
Software is gradually becoming more built by composing web services to support enterprise applications integration; thus, making the process of composing web services a significant topic. The Quality of Service (QoS) in web service composition plays a crucial role. As such, it is important to guarantee, monitor, and enforce QoS and ability to handl...
Two of the icons of Web 2.0 applications are feed readers and mashup platforms. On one hand, feed readers provide end-users with updates of content of feeds they subscribe to. On the other hand, mashups are conceptually web services created by end-users and hosted by mashup platforms which empower end-users with a tool to query the web based on the...
E-Government is defined as a system utilizing the Internet and the worldwide web for delivering government information and services to citizens. This system reduces the processing costs, improves service delivery, and increases transparency and communication between a government and its citizens. The aim of this paper is to propose a new model to m...
Several algorithms have been implemented to resolve the problem of text
categorization. Most of the work in this area geared for English text,
whereas few researches have been conducted on Arabic text. However, the
nature of Arabic text is different than English text; pre-processing of
Arabic text are more challenging. In this paper an experimental...
Software is gradually becoming more built by composing web services to support enterprise applications integration; thus, making the process of composing web services a significant topic. The Quality of Service (QoS) in web service composition plays a crucial role. As such, it is important to guarantee, monitor, and enforce QoS and ability to handl...
Nowadays; agile methodologies have gained widespread popularity. The core of agile methodologies is "individuals" and interactions between individuals inside the organization and other individuals who related to the development process. Customer collaboration is one of the main factors which affects the overall process. In this paper authors demons...
This paper compares three techniques for Arabic text classification; these techniques are Support Vector Machine (SVM) with Sequential Minimal Optimization (SMO), Naïve Bayesian (NB), and J48. The main objective of this paper is to measure the accuracy for each classifier and to determine which classifier is more accurate for Arabic text classifica...
ABSTRACT
This paper compares three techniques for Arabic text
classification; these techniques are Support Vector Machine
(SVM) with Sequential Minimal Optimization (SMO),
Naïve Bayesian (NB), and J48. The main objective of this
paper is to measure the accuracy for each classifier and to
determine which classifier is more accurate for Arabic text
c...
In a parallel system, nodes communicate with each other by exchanging messages. Different topologies exist for arranging processors in a network based on the architecture of the network; or based on the fact that a network is a multiprocessor or multi computer network. A honeycomb network is considered as a multiprocessor / multi-computer interconn...
The Web service composition has received much attention recently to support business-to-business enterprise applications integration. Many composition approaches, languages, platforms, and patents have been proposed to overcome this issue. In this paper we present some of Web service composition languages, platforms, patents, and composition strate...
The Web service composition has received much attention recently to support business-to-business enterprise applications integration. Many composition approaches, languages, platforms, and patents have been proposed to overcome this issue. In this paper we present some of Web service composition languages, platforms, patents, and composition strate...
There are several approaches which try to stop or reduce the huge amount of spam on individuals. These approaches include legislative measures such as anti-spam laws over world-wide. Other techniques are known as Origin-Based filters which are based on using network information and IP addresses in order to detect whether a message is spam or not. T...
In this paper, we explain the use of Genetic Algorithms to improve performance of Arabic information retrieval system, which based on vector space model. The performance was enhanced through the usage of an adaptive matching function, which obtained from a weighted combination of four similarity measures (Dot, Cosine, Jaccard and Dice), The genetic...
Questions
Questions (6)
Can you help me find an arabic essay grading dataset to be used for machine learning?
Is there any tool I can use to collect data about students and lecturers User-Experience(UX) in e-learning?
what is the best stemming algorithm for Arabic text? or what is the best algorithm for extracting root for Arabic text?
Can anyone help me find a good software testing manual lab, along with free software tools for testing java applications with tutorials, that I can use to teach my course software testing?
In order to relate certain diseases based on gene features. Or a tool that could help with relating diseases based on gene features.
Is there a gene data set that can be used for data mining classification and clustering?