About
16
Publications
4,593
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
26
Citations
Publications
Publications (16)
Natural language processing (NLP) is an area of artificial intelligence that applies information technologies to process the human language, understand it to a certain degree, and use it in various applications. This area has rapidly developed in the last few years and now employs modern variants of deep neural networks to extract relevant patterns...
With the rapid development of technology, the demand for mobile devices is increasing more than laptops, because their main features are large memory, great cameras, low price, and easy availability. Today, we keep too much information on our devices which is very important for our life with this there is possibility that our device has been stolen...
Natural language processing (NLP) is an area of artificial intelligence that applies information technologies to process the human language, understand it to a certain degree, and use it in various applications. This area has rapidly developed in the last few years and now employs modern variants of deep neural networks to extract relevant patterns...
Contextualized language models are becoming omnipresent in the field of Natural Language Processing (NLP). Their learning representation capabilities show dominant results in almost all downstream NLP tasks. The main challenge that low-resource languages face is the lack of language-specific language models since their pre-training process requires...
Today, data security is a significant problem in data communication. Sometimes we do not realize how susceptible we are to cyberattacks and the theft of critical information, including everything, from social network passwords to complete identities. Any system, no matter how sophisticated it is, is vulnerable and susceptible to attack. Steganograp...
Nowadays, people are not aware of how vulnerable they are to cyber-attacks and theft of personal and sensitive information, from stealing social media passwords to stealing a person’s full identity. People are not aware that their communication with the outside world can be intercepted and all sensitive and secret information stolen from them, whil...
This research aims to analyse the terminology and topics that social networks users used to express their experiences with the COVID-19 pandemic. We used three datasets concerning different aspects of the COVID-19 pandemic to accomplish this goal. The first dataset is the smallest one and contains around 3,798 tweets regarding COVID-19 Onset, and i...
Drug repurposing, which is concerned with the study of the effectiveness of existing drugs on new diseases, has been growing in importance in the last few years. One of the core methodologies for drug repurposing is text-mining, where novel biological entity relationships are extracted from existing biomedical literature and publications, whose num...
Giving the right access, limiting resources, and recognizing a user's identity are important steps that need to be taken into consideration before entering a certain network. These steps are executed by authentication and authorization. In this paper, we put our focus on authentication algorithms HOTP and TOTP as two algorithms for generating one-t...
Analyzing long text articles in the pharmaceutical domain, for the purpose of knowledge extraction and recognizing entities of interest, is a tedious task. In our previous research efforts, we were able to develop a platform which successfully extracts entities and facts from pharmaceutical texts and populates a knowledge graph with the extracted k...
The usage of machine learning is expanding over all scientific fields and this branch is becoming more and more popular in the last years. In this paper we consider application of machine learning in the cryptanalysis, precisely in cryptanalysis of DES algorithm. This algorithm works in 16 rounds and we make two analyses: one for only one round and...