About
10
Publications
4,237
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
21
Citations
Introduction
Intereseted in ePHI, EMR Security. HBC adversary models, network security
Current institution
Additional affiliations
August 2009 - May 2015
Publications
Publications (10)
This research defines the distributed denial of service (DDoS) problem in software-defined-networks (SDN) environments. The proposes solution uses Software defined networks capabilities to reduce risk, introduces a collaborative, distributed defense mechanism rather than server-side filtration. Our proposed network detection and prevention agent (N...
This paper presents a novel multiclass system designed to detect pleural effusion and pulmonary edema on chest X-ray images, addressing the critical need for early detection in healthcare. A new comprehensive dataset was formed by combining 28,309 samples from the ChestX-ray14, PadChest, and CheXpert databases, with 10,287, 6022, and 12,000 samples...
Breast cancer is one of the leading causes of death among women worldwide. However, early prediction of breast cancer plays a crucial role. Therefore, strong needs exist for automatic accurate early prediction of breast cancer. In this paper, machine learning (ML) classifiers combined with features selection methods are used to build an intelligent...
The requirements form the basis for all software products. Apparently, the requirements are imprecisely stated when scattered between development teams. Therefore, software applications released with some bugs, missing functionalities, or loosely implemented requirements. In literature, a limited number of related works have been developed as a too...
This study aims to examine information technology students' perceptions toward the use of virtual reality technology, their behavioral intention to use such technology for educational purposes, and the relationship between their perceptions toward the use of virtual reality technology and their behavioral intention to use virtual reality technology...
The expansion in automation, digitalization, and network communication in the health care sector provided advantage and developed concerns regarding privacy pro- tection and data security. The knowledge provided by medical and auxiliary data can reveal identity with high accuracy. The value of Electronic Medical Records comes from its content, the...
Providing electronic medical health records can improve the quality of service, increase the level of health care provided, save manpower, and resources. Due to the accelerated development in health care, and the adaption of computer and network technology, concerns like information misuse, privacy violation, and identity theft are evolving rapidly...
Sensor networks have been used in many applications such as health monitoring, structural monitoring, transportation networks, weather prediction, and border security. In most of these applications, sensors are used to report single phenomena/feature from the monitored field. This reporting is usually done frequently; however, the characteristics o...
Questions
Question (1)
I am looking for research focused on classifying Arabic text into ( Verb / Noun/ Letter )
most of what I found is stemming, deep learning stuff but not word classification.
Any help please ?!