About
46
Publications
16,925
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
736
Citations
Introduction
Skills and Expertise
Current institution
Additional affiliations
December 2010 - present
Publications
Publications (46)
The rapid expansion of Internet of Things (IoT) applications has underscored the critical role of edge computing in enhancing real-time data processing and responsiveness. Although deploying advanced generative AI models such as GANs and VAEs at the edge holds immense potential, the inherent constraints in computational power, memory, and energy re...
This study investigates the use of neuromorphic computing, particularly spiking neural networks (SNNs) and advanced neuromorphic hardware, to model and forecast climate patterns. Our neuromorphic system achieves high prediction accuracy, maintaining a Mean Squared Error (MSE) as low as 0.08, even with increasing data volumes. The system operates wi...
Poetry is a significant aspect of any language. Many cultures and the history of nations are recognized in poems. Compared to prose, each poem has a rhythmic structure that is quite different. The language has its set of lyrical structures for poems, known as meters. Detecting the meters of Arabic poems is a complicated and lengthy procedure. The t...
Examining facial expressions is a crucial aspect that garners attention due to its significance in divulging emotional states. This study delves into employing a robust deep learning method for automatically analyzing and identifying facial emotions in images. The chosen technique revolves around the convolutional neural network (CNN) algorithm. A...
Artificial intelligence (AI) approaches have been shown to be effective in classifying skin diseases and outperforming dermatologists in diagnosis. Using big data as a dermatological diagnosis service can present several challenges. One challenge is the need to accurately label and classify large amounts of data, such as images of infected skin. Th...
Artificial intelligence (AI) approaches have been shown to be effective in classifying skin diseases and outperforming dermatologists in diagnosis. Using big data as a dermatological diagnosis service can present several challenges. One challenge is the need to accurately label and classify large amounts of data, such as images of infected skin. Th...
Diabetes is a metabolic disorder in which the body is unable to properly regulate blood sugar levels. It can occur when the body does not produce enough insulin or when cells become resistant to insulin’s effects. There are two main types of diabetes, Type 1 and Type 2, which have different causes and risk factors. Early detection of diabetes allow...
Satisfaction Detection is one of the most common issues that impact the business world. So, this study aims to suggest an application that detects the Satisfaction tone that leads to customer happiness for Big Data that came out from online businesses on social media, in particular, Facebook and Twitter, by using two famous methods, machine learnin...
Satisfaction Detection is one of the most common issues that impact the business world. So, this study aims to suggest an application that detects the Satisfaction tone that leads to customer happiness for Big Data that came out from online businesses on social media, in particular, Facebook and Twitter, by using two famous methods, machine learnin...
Since the early days of 2020, COVID-19 has tragic effects on the lives of human beings all over the world. To combat this disease, it is important to survey the infected patients in an inexpensive and fast way. One of the most common ways of achieving this is by performing radiological testing using chest X-Rays and patient coughing sounds. In this...
Location‐based services (LBSs) have drastically changed the way smart cities and smart buildings operate, giving a new dimension to the life of citizens. LBS have various applications ranging from power management, marketing, vehicle to everything communication to social networking, and many other applications. The concept of LBS relies on the esti...
Bernstein expansion of a polynomial function has linear and quadratic rates of convergence to the original function. In this paper, we extend a direct approximation method by the minimum and maximum Bernstein control points to multivariate polynomials and continuous rational functions over boxes. Furthermore, we explore the rate of convergence and...
Localisation is one of the most important services in sensor networks. The impact of the used localisation technique used reflects on wireless sensor network services such as coverage or event detection. Accuracy is considered to be one of the factors that is related to successful network performance in most sensor network applications. Communicati...
Introduction
Stemming is an important preprocessing step in text classification, and could contribute in increasing text classification accuracy. Although many works proposed stemmers for English language, few stemmers were proposed for Arabic text. Arabic language has gained increasing attention in the previous decades and the need is vital to fur...
Background: Stemming is an important preprocessing step in text classification, and could contribute in increasing text classification accuracy. Although many works proposed stemmers for English language, few stemmers were proposed for Arabic text. Arabic language has gained increasing attention in the previous decades and the need is vital to furt...
Globally, the acceptance of Open Source Software (OSS) varies among the users of a company. Despite the substantive software, social, and infrastructure-related implications of OSS acceptance, the research on the acceptance of OSS across organizations inhabitants remains surprisingly limited. To propose a model for the acceptance of OSS; investigat...
Requirement gathering is a vital step in software engineering. Even though many recent researches concentrated on the improvement of the requirement gathering process, many of their works lack completeness especially when the number of users is large. Data Mining techniques have been recently employed in various domains with promising results. In t...
Requirement gathering is a vital step in software engineering. Even though many recent researches concentrated on the improvement of the requirement gathering process, many of their works lack completeness especially when the number of users is large. Data Mining techniques have been recently employed in various domains with promising results. In t...
Localization is an important primitive that is utilized in a number of important applications such as location-based mobile services, augmented reality, and autonomous mobile robotics. While the GPS technology is considered the de facto standard for outdoor localization, it is known to suffer from significant accuracy limitation in urban areas. In...
Medical images have a very significant impact in the diagnosing and treating process of patient ailments and radiology applications. For many reasons, processing medical images can greatly improve the quality of radiologists’ job. While 2D models have been in use for medical applications for decades, wide-spread utilization of 3D models appeared on...
Swarm intelligence is a kind of artificial intelligence that is based on the collective behavior of the decentralized and self-organized systems. This work focuses on reviewing a heuristic global optimization method called particle swarm optimization (PSO). This includes the mathematical representation of PSO in contentious and binary spaces, the e...
In the last few years, CAD systems has been op- timized significantly medical applications. Digital systems have been employed recently in diagnosing procedures and facilitate the process in determining illness in patients. Different scanner system have been used to acquire medical images, which are different the quality output. The main problem as...
Acceptable error rate, low quality assessment, and time complexity are the major problems in image segmentation, which needed to be discovered. A variety of acceleration techniques have been applied and achieve real time results, but still limited in 3D. HMM is one of the best statistical techniques that played a significant rule recently. The prob...
Background: Recommender Systems use user interests to provide more accurate recommendations according to user actual interests and behavior.
Methods: This work aims at improving recommender systems by discovering hidden user interests from the existing interests. User interest expansion would contribute in improving the accuracy of recommender sys...
The Blind and Visually Impaired (BVI) encounter various difficulties during their daily activities like path planning, navigation and obstacle avoidance. Many BVI still trust and rely on the white cane to explore their environments. The state-of-the-art white canes have audio systems to guide the BVI through their environment. In this paper, we pre...
We investigate supporting emergency response operations with opportunistic resource utilization networks (“oppnets”), based on a network paradigm for inviting and integrating diverse devices and systems available in the environment. We simulate chemical spill on a single floor of a building and indicate how oppnets can assist first responders in fi...
Purpose ‐ Outdoor localization is an important issue for many applications, such as autonomous mobile robotics and augmented reality. The purpose of this paper is to propose a budgeted dynamic exclusion heuristic based on signal phase shifts from multiple base stations. Design/methodology/approach ‐ The authors also propose an outdoor localization...
Precise and robust localization of humans is one of the most demanding challenges that researchers face these days. GPS provides a perfect solution in open areas with acceptable localization accuracy. However, in indoor environments where GPS service is almost denied, dead reckoning algorithms that utilize low cost sensors provide alternative solut...
Since resources are scarce and cannot be compensated easily on the battlefield, resource planning and battlefield management should be performed to reserve as much resources as possible. However, most resource planning problems encountered on the battlefield are computationally intractable. Therefore, no exact solution can be found when the battlef...
The majority of vehicle-to-vehicle (V2V) protocols presented in the literature utilize a combination of controlled access techniques (e.g., TDMA, FDMA, CDMA) to provide prioritized access to the communication medium. While these protocols split the capacity of the communication link to support a maximum number of users with different priority level...