About
88
Publications
67,802
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,331
Citations
Introduction
Current institution
Publications
Publications (88)
PurposeCoronavirus 2019 (COVID-19) had major social, medical, and economic impacts globally. The study aims to develop a deep-learning model that can predict the severity of COVID-19 in patients based on CT images of their lungs.
MethodsCOVID-19 causes lung infections, and qRT-PCR is an essential tool used to detect virus infection. However, qRT-PC...
Recent technological advancements, like big data analytics, is driving the growing adoption of cyber-physical systems and digital twins in the area of healthcare. Congenital hydrocephalus is one important example of recent healthcare data analytics. Congenital hydrocephalus is a buildup of excess cerebrospinal fluid (CSF) in the brain at birth. Con...
Kidney tumor (KT) is one of the diseases that have affected our society and is the seventh most common tumor in both men and women worldwide. The early detection of KT has significant benefits in reducing death rates, producing preventive measures that reduce effects, and overcoming the tumor. Compared to the tedious and time-consuming traditional...
Plenty of disease types exist in world communities that can be explained by humans’ lifestyles or the economic, social, genetic, and other factors of the country of residence. Recently, most research has focused on studying common diseases in the population to reduce death risks, take the best procedure for treatment, and enhance the healthcare lev...
Dataset of An extensive study of authorship authentication of Arabic articles".
Fog computing is a promising technology that is used by many organizations and end-users. It has characteristics and advantages that offer services such as computing, storage, communication, and application services. It facilitates these services to end-users and allows to increase the number of devices that can connect to the network. In this pape...
Fog computing is one of the most important technologies and promising computing model used by many end-users, organizations, and companies. This model has many qualities, characteristics, advantages and offers many services to end-users like compute, and application services. So, it facilitates the services that provided it to the end-users and all...
orcid.org/0000-0001-5030-6196
Educational Data Mining (EDM) is a developing research field that has driven many researchers’ interests. The advancement in applying statistical and conventional measurements on the academic process has taken huge leaps in the past few years. In this paper, a robust prediction model based on the Random Forest Algorithm is provided. In this paper,...
Internet of Things (IoT) is one of the leading technologies in the IT field. All the industries are trying to employ the advantages of this technology by integrating it in different functions. Healthcare is one of the top industries that saw the benefits of incorporating this technology and gaining a great benefit from the evolution of it. This pap...
the pervasiveness of the Internet of Things (IoT)
has let to its usage in every aspect of our daily life. One
significant usage of IoT is in homes to create what we call
smart homes. Smart home systems are becoming the main
threat to our private life with our families due to security
loopholes in these systems. In this paper, we survey security
iss...
over the past few years, the world community is waking up to the shocking realities of environmental chaos and the growing consumption of energy in our world resulting from the great development of information and communications technology (ICT), especially after the advent of the term Internet of Things (IoT). Therefore, the trend towards more sus...
With the increasing amount of information and inflation of pages in the World Wide Web, it becomes difficult for the user to retrieve relevant information it needs. In other words, it leads to a big challenge for a search engine, on how to extract the exact results that match with the user query. Hence, we need smart programs such as Web Crawlers t...
The pervasiveness of the Internet of Things (IoT) has led to its usage in many aspects of our daily life. One significant usage of IoT is in its integration with smart home systems. Since the smart home systems consist of components that can be controlled using the Internet, these systems are prone to becoming the main source of threat to our priva...
MANET (Mobile Ad-hoc Network) is simply a set of mobile hosts connected wirelessly without
any centralized management, where each node acts as a packet sender, packet receiver, and a
router at the same time. According to the nature of this network, the dynamic topology and the
absence of a centralized management cause several security issues and at...
Quranic Recitation Rules (Ahkam Al-Tajweed) are the articulation rules that should be applied properly when reciting the Holy Quran. Most of the current automatic Quran recitation systems focus on the basic aspects of recitation, which are concerned with the correct pronunciation of words and neglect the other Ahkam Al-Tajweed that are related to t...
The ability to automatically determine the political orientation of an article can be of great benefit in many areas from academia to security. However, this problem has been largely understudied for Arabic texts in the literature. The contribution of this work lies in two aspects. First, collecting and manually labeling a corpus of articles and co...
Quranic Recitation Rules (Ahkam Al-Tajweed) are the articulation rules that should be applied properly when reciting the Holy Quran. Most of the current automatic Quran recitation systems focus on the basic aspects of recitation, which are concerned with the correct pronunciation of words and neglect the advanced Ahkam Al-Tajweed that are related t...
The energy-efficiency issue has been widely investigated in wireless sensor networks (WSNs), it is still in its infancy, creating hurdles for the further evolution of WSNs. To improve the energy efficiency, many power-aware routing protocols have been investigated. One of the most effective solutions is the hybrid distributed clustering routing app...
Software quality is considered as one of the most highly interacting aspects in software engineering. It has many dimensions that vary depending on the users' requirements and their points of view. Thus, the varying dimensions lead to complications in measuring and defining the software quality appropriately. The use of libraries increases software...
Purpose_
The authorship authentication (AA) problem is concerned with correctly attributing a text document to its corresponding author. Historically, this problem has been the focus of various studies focusing on the intuitive idea that each author has a unique style that can be captured using stylometric features (SF). Another approach to this pr...
Metamorphic malware are able to change their appearance to evade detection by traditional anti-malware software. One of the ways to help mitigate the threat of new metamorphic malware is to determine their origins, i.e., the families to which they belong. This type of metamorphic malware analysis is not typically handled by commercial software. Mor...
The Arabic language is a collection of spoken dialects and a standard written language. The dialects show phonological, morphological, lexical, and syntactic. Differences, although the standard written language is the same throughout the Arab world. The present work reports our attempt in developing a bi-lingual Machine Translation tool for simple...
The increasing numbers of on-line text documents make the process of searching and accessing documents related to a specific category a very difficult task. By classifying the documents, the search is then limited to only those documents that related to a particular category. Text classification is the process of classifying documents based on thei...
Addressing the health problems of the 21st century will require individuals to use a new set of medical and public health resources that extend beyond historic and traditional medical devices and are built on current and smart information technologies. Much of these new medical tools was originally designed by device manufacturers to be used only i...
Purpose
Multi-label Text Classification (MTC) is one of the most recent research trends in data mining and information retrieval domains because of many reasons such as the rapid growth of online data and the increasing tendency of internet users to be more comfortable with assigning multiple labels/tags to describe documents, emails, posts, etc. T...
The keyphrase is a sentence or a part of a sentence that contains a sequence of words that expresses the meaning and the purpose of any given paragraph. Keyphrase extraction is the task of identifying the possible keyphrases from a given document. Many applications including text summarization, indexing, and characterization use keyphrase extractio...
The massive amount of semi-structured data contained within the text documents makes the process of classifying them manually a very difficult task. Automatic text classification is the process of classifying documents based on their contents into a predefined set of categories. This paper provides a comparison of the performance of well-known text...
There are several researches and procedures for classifying Arabic-language texts that are based mostly on different environments. This lack of dependence on a unified standard (such as a unified dataset) makes it hard to determine the most accurate technique for classification. In this paper, we study and analyze the classification algorithms base...
Multi-label text classification (MTC) is a natural extension of the traditional text classification (TC) in which a possibly large set of labels can be assigned to each document. The dimensionality of labels makes MTC difficult and challenging. Several ways are proposed to ease the classification process and one of them is called the problem transf...
Multi-label text classification (MTC) is a natural extension of the traditional text classification (TC) in which a possibly large set of labels can be assigned to each document. The dimensionality of labels makes MTC difficult and challenging. Several ways are proposed to ease the classification process and one of them is called the problem transf...
Internet of Things (IoT) has become a common buzzword nowadays in the Web. However, there is no search tool currently in place for discovering and learning about the different types of IoT elements. Hence, this paper presents a topical search engine for IoT. The motivation for a topical search engine comes from the relatively poor performance of ge...
The prevalence of the dynamic online web pages (such as the social networks, forums, personal Blogs, etc.) that are covering all fields (such as social events, economical events, political events, etc.) are allowing the Internet surfers to interact with their contents such as writing comments and articles. Regarding politics and political events, t...
Computer-aided diagnosis (CAD) systems have gained a lot of popularity in the past few decades due to their effective-ness and usefulness. A large number of such systems are proposed for a wide variety of abnormalities including those related to coronary artery disease. In this work, a CAD system is proposed for such a purpose. Specifically, the pr...
In this paper, we experimented a large set of feature extraction methods with fast and simple computation approaches. Some of those methods were proposed in different areas and domains and we thought of evaluating their ability in enhancing the image retrieval process. Several low-level image features are selected as part of our image retrieval sys...
There are many hot topics related to information retrieval paradigm, and one of these important fields is Automatic text indexing that aims to make process of online retrieving documents easier for the web searchers. In this paper we intend to introduced a comprehensive study on Indexing Arabic Documents, since there have been little works deals wi...
Cloud computing is a term used to describe a network with huge number of devices connected via the internet and can share a variety of data and information remotely. However, cloud computing has very limited facilities that may or can provide beneficial advantages for information retrieval; cloud should be independent and reasonable. Hence, in orde...
Most research in Arabic roots extraction focuses on removing affixes from Arabic words. This process adds processing overhead and may remove non-affix letters, which leads to the extraction of incorrect roots. This paper advises a new approach to dealing with this issue by introducing a new algorithm for extracting Arabic words' roots. The proposed...
In this work, we consider the authorship authentication problem, a historical problem in linguistics that has been made more difficult with the explosion of the Internet and the increase in the amount of unverified texts and hard to check claims posted online. We focus on the Arabic language for which this problem is still largely understudied desp...
In the last few years, the amount of information that is available on the Internet to the users grows rapidly. Due to this, the searching process for information or certain items and decision-making in most cases became difficult and very complex. The recommendation system technique is very important to help users how to deal with information overl...
Text categorization or classification (TC) is concerned with placing text documents in their proper category according to their contents. Owing to the various applications of TC and the large volume of text documents uploaded on the Internet daily, the need for such an automated method stems from the difficulty and tedium of performing such a proce...
Computer aided diagnosis is a hot research field. Systems with the ability to provide a highly accurate diagnosis using little resources are highly desirable. One type of such systems depend on medical images to provide instantaneous diagnosis based on some discriminative features extracted from the images after processing them for noise removal an...
—Computer aided diagnosis is a hot research field. Systems with the ability to provide a highly accurate diagnosis using little resources are highly desirable. One type of such systems depend on medical images to provide instantaneous diagnosis based on some discriminative features extracted from the images after processing them for noise removal a...
Text classification (TC) is one of important techniques used to categorize documents into a predefined categories based on their content. It is used in many applications such as classification of web pages, email messages, and news stories. Recently, there are some research works on applying TC techniques using Arabic text. The main goal of this pa...
Stock prices prediction is interesting and challenging research topic. Developed countries' economies are measured according to their power economy. Currently, stock markets are considered to be an illustrious trading field because in many cases it gives easy profits with low risk rate of return. Stock market with its huge and dynamic information s...
Software quality is considered as one of the most important challenges in software engineering. It has many dimensions which differ from users’ point of view that depend on their requirements. Therefore, those dimensions lead to difficulty in measuring and defining the software quality properly. Software quality measurement is the main core of the...
The continuous information explosion through the Internet and all information
sources makes it necessary to perform all information processing activities
automatically in quick and reliable manners. In this paper, we proposed and
implemented a method to automatically create and Index for books written in
Arabic language. The process depends largely...
This paper introduces three new text classification methods: Clustering-Based Generalised Instances Set (CB-GIS), Multilevel Clustering-Based Generalised Instances Set (MLC_GIS) and Multilevel Clustering-Based, k Nearest Neighbours (MLC-kNN). These new methods aim to unify the strengths and overcome the drawbacks of the three similarity-based text...
This study investigates the effectiveness of a new automatic query expansion technique for the purpose of Information Retrieval (IR). Automatic query expansion have been studied in information retrieval research to solve the problem of short queries and word mismatch between user's queries and author's documents. The proposed approach uses a metric...
The performance of spatial queries depends mainly on the underlying index structure used to handle them. R-tree, a well-known spatial index structure, suffers largely from high overlap and high coverage resulting mainly from splitting the overflowed nodes. Assigning the remaining entries to the underflow node in order to meet the R-tree minimum fil...
Root extraction is one of the most important topics in information retrieval (IR), natural language processing (NLP), text summarization, and many other important fields. In the last two decades, several algorithms have been proposed to extract Arabic roots. Most of these algorithms dealt with triliteral roots only, and some with fixed length words...
In the last few years, as Internet usage becomes the main artery of the life's daily activities, the problem of spam becomes very serious for internet community. Spam pages form a real threat for all types of users. This threat proved to evolve continuously without any clue to abate. Different forms of spam witnessed a dramatic increase in both siz...
This paper reports a comparative study of two machine learning methods on Arabic text categorization. Based on a collection of news articles as a training set, and another set of news articles as a testing set, we evaluated K nearest neighbor (KNN) algorithm, and support vector machines (SVM) algorithm. We used the full word features and considered...
Genetic algorithms are an evolutionary technique that uses selection, crossover, and mutation operators to solve optimization problems using a survival of the fittest idea. In this paper, a straightforward genetic algorithm is used to solve the Constraint Satisfaction Problem (CSP). As many different selection, crossover and mutation operators have...
In this paper, a decision making strategy for commands' transfer in distributed systems is introduced. A mathematical model based on a semi-prediction strategy regarding a decision that is to be taken for job transferring has been investigated. The problem of executing a job locally, remotely or downloading a proper function located at a different...
A speedup improvement to an Associative Access (ASSA) method, which is an information retrieval algorithm, has been suggested by Berkovich and others. The improvement is achieved through a novel technique of vertical counting. The vertical counting approach calculates the number of “ones” in characteristic vectors without performing the shift opera...
The object of this paper is to introduce a λ-type calculus which is easier to handle than the known λ-calculus. We were able to represent conditional functions and Booleans, in the λ-type calculus, in a form that is easy to understand and easy to compute.
We have put together a corpus of 242 abstracts of Arabic documents using the Proceedings of the Saudi Arabian National Conferences as a source. All these abstracts involve computer science and information systems. We also designed and built an automatic information retrieval system from scratch to handle Arabic data. The system was implemented in t...
Thesis (Ph. D.)--Illinois Institute of Technology, 1995. Includes bibliographical references (leaves 125-130).
This paper introduces a new algorithm called User Association Rules Mining (UARM) for solving the problem of generating inadequate large number of rules in mining association technique using a fuzzy logic method (1, 2). In order to avoid user's defined threshold mistakes, the user has flexibility to determine constraints based on a set of features....
This paper proposes a modified approach for the concept based query expansion method referred to as a New Approach for Automatic Query Expansion using Genetic Algorithm (NAQEGA). This technique employs query concept to find the most similar term to the query and adds this term to the query to form another query terms. This process is repeated until...
Thesis (Ph. D.)--Illinois Institute of Technology, 1995. Includes bibliographical references (leaves 125-130). Microfilm.