Laiali Almazaydeh

Laiali Almazaydeh
Abu Dhabi University · College of Engineering and Computer Science

Ph.D. Computer Science & Engineering
Full Professor, Abu Dhabi University, UAE

About

63
Publications
36,899
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
662
Citations
Introduction
Laiali has published more than 70 research papers in various international journals and conferences proceedings, her research interests include human-computer interaction, pattern recognition, and computer security. She received best paper awards in 3 conferences, ASEE2012, ASEE2013, and ICUMT 2016
Additional affiliations
January 2018 - present
Al-Hussein Bin Talal University
Position
  • Professor (Associate)
July 2013 - January 2018
Al-Hussein Bin Talal University
Position
  • Professor (Assistant)
Education
May 2009 - May 2013
University of Bridgeport
Field of study
  • Computer Science & Engineering

Publications

Publications (63)
Article
Full-text available
The gaming industry produces vast amounts of user-generated feedback, making it challenging for developers to efficiently analyze and respond to real-time reviews. This study addresses the problem of classifying large-scale unstructured user feedback from Steam reviews. In this paper an approach that integrates traditional machine learning models a...
Article
Full-text available
Voice signal analysis is becoming one of the most significant examination in clinical practice due to the importance of extracting related parameters to reflect the patient's health. In this regard, various acoustic studies have been revealed that the analysis of laryngeal, respiratory and articulatory function may be efficient as an early indicato...
Article
Full-text available
Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information, a practice known as phishing. This study utilizes three distinct methodologies, Term Frequency-Inverse Document Frequency, Word2Vec, and Bidirectional Encoder Representations from Transformers, to evaluate the ef...
Article
Full-text available
Intrusion detection systems (IDS) protect networks from threats; they actively monitor network activity to identify and prevent malicious actions. This study investigates the application of machine learning methods to strengthen IDS, explicitly emphasizing the comprehensive CICIDS 2017 dataset. The dataset was refined by implementing stringent prep...
Article
Full-text available
Breast cancer continues to be a substantial worldwide health concern, affecting millions of individuals each year; this emphasizes the critical nature of early detection in order to enhance patient prognoses. The present study aims to assess the classification performance of three convolutional neural network (CNN) architectures-visual geometry gro...
Conference Paper
Full-text available
Enhancing information security has become a necessary and comprehensive cybersecurity mission. In today's landscape, operating systems and software have become more secure, leading attackers to exploit the human element as a means to breach organizational information systems. As the frequency and sophistication of cyber-attacks targeting unsuspecti...
Article
Full-text available
Breast cancer is one of the leading causes of death among women worldwide. However, early prediction of breast cancer plays a crucial role. Therefore, strong needs exist for automatic accurate early prediction of breast cancer. In this paper, machine learning (ML) classifiers combined with features selection methods are used to build an intelligent...
Article
Full-text available
The accelerated incorporation of Artificial Intelligence (AI) technologies into the Information Technology (IT) landscape presents both prospects and challenges for governance frameworks. This mixed-methods study provides an exhaustive examination of the role of AI in IT governance. The research is rooted in STEM disciplines and employs a two-prong...
Article
Full-text available
China is the largest emitter of greenhouse gases globally, responsible for a substantial portion of the world's total carbon dioxide emissions. Many researchers investigated this issue; however, the literature is silent on how FinTech-based incentives can improve environmental performance. The research aims to shed light on the complex relationship...
Article
Full-text available
The requirements form the basis for all software products. Apparently, the requirements are imprecisely stated when scattered between development teams. Therefore, software applications released with some bugs, missing functionalities, or loosely implemented requirements. In literature, a limited number of related works have been developed as a too...
Article
Full-text available
This study aims to examine information technology students' perceptions toward the use of virtual reality technology, their behavioral intention to use such technology for educational purposes, and the relationship between their perceptions toward the use of virtual reality technology and their behavioral intention to use virtual reality technology...
Article
Full-text available
Clinical text classification of electronic medical records is a challenging task. Existing electronic records suffer from irrelevant text, misspellings, semantic ambiguity, and abbreviations. The approach reported in this paper elaborates on machine learning techniques to develop an intelligent framework for classification of the medical transcript...
Article
Full-text available
This paper introduces a novel approach to enhance the efficiency of compressing Arabic Unicode text using the Lempel-Ziv-Welch (LZW) technique. This method includes two stages: transformation and compression. During the first phase, a multi-level scheme that works according to the level of words, syllables, and characters replaces multi-byte symbol...
Conference Paper
Full-text available
This paper addresses aspects related to quantum machine-based classification such as data encoding into quantum states, Barren plateau, robustness, and effectiveness with developing a classical artificial neural versus fully and hybrid quantum neural network approach. The two approaches were compared with a classical artificial neural network using...
Article
Full-text available
The Wireless Sensor Networks (WSNs) are characterized by their widespread deployment due to low cost, but the WSNs are vulnerable to various types of attacks. To defend against the attacks, an effective security solution is required. However, the limits of these networks’ battery-based energy to the sensor are the most critical impediments to selec...
Article
Full-text available
Recent rapid technological advancements in pattern recognition and computer vision have led to great results on a wide range of applications. One of these applications is herbal plant species identification, as the proper automated system for the recognition of herbal plants is required for botanists to study therapeutic and nutritional uses of her...
Article
Full-text available
Many designed systems have shown the potential of virtual reality (VR) to greatly transform autism treatment studies. Indeed, the literature shows that treatment via VR is appropriate for effective and repeatable training, without the intense anxiety, allowing trainees to recognize and modulate errors as they occur. This study evaluates the effecti...
Article
Full-text available
Genres are one of the key features that categorize music based on specific series of patterns. However, the Arabic music content on the web is poorly defined into its genres, making the automatic classification of Arabic audio genres challenging. For this reason, in this research, our objective is first to construct a well-annotated dataset of five...
Article
Full-text available
The globe is grappling with the COVID-19 pandemic, which has enslaved the economy, including the educational sector. This epidemic has caused recent changes and disruptions in all aspects of life, this pandemic has compelled educational systems all across the world to find altarenate methods to keep the process of education going on. To cope with t...
Article
Full-text available
The study aimed to investigate the effectiveness of using interactive simulation in developing some physics concepts in a sample of kindergarten children. To achieve the study objective, a semi-experimental method was used. The study sample consisted of the (45) kindergarten children of ‘The Pink Bird’ Kindergarten in Petra. They were randomly divi...
Article
Full-text available
The study of software engineering professional practices includes the use of the formal methodology in a software development. Identifying the appropriate methodology will not only reduce the failure of software but will also help to deliver the software in accordance with the predetermined budget and schedule. In literature, few works have been de...
Article
Full-text available
Network optimization is a highly relevant solution to the growing demands of mobile communications. Increasing the efficiency of the existing spectrum and infrastructure drives down costs and improves provider networks' usability. This paper focuses on applying data mining to the evaluation of network performance as a viable tool for resource alloc...
Conference Paper
Full-text available
As more devices become internet-connected, there is a greater need for secure and discrete device-to-device communication. Data shows that at the time of this writing the number of internet-connected devices is around 20 billion and is expected to increase to 29 billion by the end of 2022. In the early days of IoT the majority of the market was com...
Article
Full-text available
Due to rapid development in mobile communication technology in recent years, the demand for high quality and high capacity networks with thorough coverage has become a major necessity. Several models have been developed for predicting wireless signal coverage in urban areas, but these models suffer from inadequately calculating certain conditions,...
Article
Full-text available
Line extraction is a critical step from one of the main sub-tasks of Document Image Analysis, which is layout analysis. This paper presents a new method for curvilinear text line extraction and straightening in Arabic handwritten documents. The proposed method is based on a strategy that consists of two distinct steps. First, text line is extracted...
Article
Computer games have become one of the most significant digital applications due to the rapid improvement of software industry. Developers create computer games based on a combination of interleaving elements that contain technical and artistic aspects. Therefore, games development needs a comprehensive ideal path including different design consider...
Article
The automatic text summarisation is a challenging task. Existing techniques suffer from inadequate investigation for Arabic text. The majority of Arabic words are derived according to the morphology that is more complicated than English and other natural languages. The approach reported in this paper elaborates a morphological analysis to develop a...
Article
The automatic text summarisation is a challenging task. Existing techniques suffer from inadequate investigation for Arabic text. The majority of Arabic words are derived according to the morphology that is more complicated than English and other natural languages. The approach reported in this paper elaborates a morphological analysis to develop a...
Conference Paper
Most of mobile applications tend to function in an insecure manner whenever they are presented with SSL certificates which cannot be trusted. This is true for the applications which are not web browsers and need to connect/communicate with the internet as a part of their operation. This paper intends to research and show if proxy SSL based attacks...
Article
Full-text available
Road signs classification is becoming one of the most significant technologies in driver assistance systems due to the importance of recognizing speed-limit signs to inform and alert drivers when they have limited conscious awareness. In this study, a robust approach for Speed-Limit Signs (SLS) detection and recognition with different distances and...
Article
Full-text available
Virtual laboratory is becoming one of the most significant educational technologies due to financial challenges which often required construction of physical laboratories, particularly in educational institutions in developing countries. This paper presents an integrated virtual environment to help individual learners to enhance the practical learn...
Article
Full-text available
Sleep apnea (SA) in the form of Obstructive sleep apnea (OSA) is becoming the most common respiratory disorder during sleep, which is characterized by cessations of airflow to the lungs. These cessations in breathing must last more than 10 seconds to be considered an apnea event. Apnea events may occur 5 to 30 times an hour and may occur up to four...
Article
Full-text available
Falls are a major risk of injury for elderly aged 65 or over, blind people, people with balance disorder and leg weakness. In this regard, assistive technology which aims to identify fall events at real time can reduce the rate of impairments and mortality. This study offer a literature research reference value for bioengineers for further research...
Article
Full-text available
Sleep apnea (SA) is the most commonly known sleeping disorder characterized by pauses of airflow to the lungs and often results in day and night time symptoms such as impaired concentration, depression, memory loss, snoring, nocturnal arousals, sweating and restless sleep. Obstructive Sleep Apnea (OSA), the most common SA, is a result of a collapse...
Conference Paper
Full-text available
Security of deployed wireless sensor networks (WSNs) has become a crucial task as the deployment of WSN'S grows. This paper proposes a novel way and develops a mechanism to prevent wormhole attacks by an algorithm to manage a large number of nodes using node ID. Also, the proposal creates a load balancing feature for monitoring a hierarchical syste...
Conference Paper
Full-text available
In this paper we propose and simulate an energy efficient protocol for object-tracking over Wireless Sensor Networks. The proposed algorithm aims to use virtual clustering among the observation region to initiate duty-cycle across the border nodes and the nodes in the inside region. The mean idea is to keep the outer nodes active and the interior n...
Article
Full-text available
Obstructive sleep apnea (OSA) is the most common form of different types of sleep-related breathing disorders. It is characterized by repetitive cessations of respiratory flow during sleep, which occurs due to a collapse of the upper respiratory airway. OSA is majorly undiagnosed due to the inconvenient Polysomnography (PSG) testing procedure at sl...
Data
Full-text available
Obstructive sleep apnea (OSA) is the most common form of different types of sleep-related breathing disorders. It is characterized by repetitive cessations of respiratory flow during sleep, which occurs due to a collapse of the upper respiratory airway. OSA is majorly undiagnosed due to the inconvenient Polysomnography (PSG) testing procedure at sl...
Conference Paper
Full-text available
This study offers a literature research reference value for bioengineers and practitioner medical doctors. It could reduce research time and improve medical service efficiency regarding Obstructive Sleep Apnea (OSA) detection systems. Much of the past and the current apnea research, the vital signals features and parameters of the SA automatic dete...
Book
In this paper we suggest to develop a vehicle's speed and fines control system to manage and control different aspects of fleet and cruise management system. The system developed to be sponsored by the government, which is represented by Department of Motor Vehicle (DMV) and should be operated by them. The purposes of the proposed project include s...
Conference Paper
Full-text available
In this paper, a robust approach for real time face recognition where the images come from live video is proposed. To improve the algorithmic efficiency of face detection, we combine the eigenface method using Haar-like features to detect both of eyes and face, and Robert cross edge detector to locate the human face position. Robert Cross uses the...
Conference Paper
Full-text available
Obstructive Sleep Apnea (OSA) is a very serious sleeping disorder resulting in the temporary blockage of the airflow airway that can be deadly if left untreated. OSA is not a rare condition; in the US, from 18 to 50 million people, most of them remain undiagnosed due to cost, cumbersome and resource limitations of overnight polysomnography (PSG) at...
Conference Paper
Full-text available
Sleep apnea (AP) is the most commonly known sleeping disorder characterized by pauses of airflow to the lungs and often results in day and night time symptoms such as impaired concentration, depression, memory loss, snoring, nocturnal arousals, sweating and restless sleep. Obstructive Sleep Apnea (OSA), the most common SA, is a result of a collapse...
Conference Paper
Full-text available
Sleep apnea is the instance when one either has pauses of breathing in their sleep, or has very low breath while asleep. This pause in breathing can range in frequency and duration. Obstructive sleep apnea (OSA) is the common form of sleep apnea, which is currently tested through polysomnography (PSG) at sleep labs. PSG is both expensive and inconv...
Article
Full-text available
A wireless sensor network (WSN) consists of large number of sensor nodes where each node operates by a finite battery for sensing, computing, and performing wireless communication tasks. Energy aware routing and MAC protocols were proposed to prolong the lifetime of WSNs. MAC protocols reduce energy consumption by putting the nodes into sleep mode...
Article
Full-text available
Obstructive sleep apnea (OSA) is a common disorder in which individuals stop breathing during their sleep. These episodes last 10 seconds or more and cause oxygen levels in the blood to drop. Most of sleep apnea cases are currently undiagnosed because of expenses and practicality limitations of overnight polysomnography (PSG) at sleep labs, where a...
Conference Paper
Full-text available
Obstructive sleep apnea (OSA) is a common disorder in which individuals stop breathing during their sleep. Most of sleep apnea cases are currently undiagnosed because of expenses and practicality limitations of overnight polysomnography (PSG) at sleep labs, where an expert human observer is needed to work over night. New techniques for sleep apnea...
Article
Full-text available
Obstructive sleep apnea (OSA) is a common disorder in which individuals stop breathing during their sleep. Most of sleep apnea cases are currently undiagnosed because of expenses and practicality limitations of overnight polysomnography (PSG) at sleep labs, where an expert human observer is needed to work over night. New techniques for sleep apnea...
Article
Full-text available
A conservative distributed simulation requires all logical processes (LPs) to follow the causality constraint requirement. This implies that all event-messages are processed in strictly timestamp order. Apart from the timestamp of each event generated by LPs, synchronization between all LPs is the second most important requirements. Finally, there...
Article
Full-text available
The efficiency of sensor networks strongly depends on the routing protocol used. In this paper, we analyze three different types of routing protocols: LEACH, PEGASIS, and VGA. Sensor networks aresimulated using Sensoria simulator. Several simulations are conducted to analyze the performance of these protocols including the power consumption and ove...
Article
Full-text available
Though we already had a standardized way (from Oracle) for Disaster Recovery policy, a major crash of the PLMdatabase made our DBAs to come up with a proposal to execute a procedure using Data Guard together withOracle Transportable Tablespace which resulted in the successful and timely migration of the PLM Productionfrom Oracle 9.2.0.3 on HP N-Cla...

Network

Cited By