Mustafa Ali Abuzaraida

Mustafa Ali Abuzaraida
Verified
Mustafa verified their affiliation via an institutional email.
Verified
Mustafa verified their affiliation via an institutional email.
  • Doctor of Philosophy
  • Professor (Associate) at Misurata University

About

76
Publications
28,026
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
516
Citations
Introduction
Research interest is on Image processing, Data science, Data mining, Artificial intelligence applications, and Natural Language Processing (NLP) mainly on text normalization
Current institution
Misurata University
Current position
  • Professor (Associate)
Additional affiliations
July 2009 - June 2014
International Islamic University Malaysia
Position
  • PhD Student
January 2007 - August 2018
Misurata University
Position
  • Lecturer
July 2015 - October 2017
Misurata University
Position
  • Head of Faculty

Publications

Publications (76)
Article
Full-text available
As a result of the proliferation of social media, cyberbullying has become widespread in the Arab community on social media and cyberbullying has become a concern targeting individuals and may cause some serious side effects. The problems of Natural Language Processing (NLP) for the Arabic language and its complexity make it difficult to classify t...
Thesis
As a result of the proliferation of social media, cyberbullying has become widespread in the Arab community on social media and cyberbullying has become a concern targeting individuals and may cause some serious side effects. The problems of Natural Language Processing (NLP) for the Arabic language and its complexity make it difficult to classify t...
Article
Full-text available
In recent decades, the resources available for Arabic natural language processing have undergone a significant increase and development. This includes the exploration of Arabic Language Sentiment Analysis from Arabic utterances in both Modern Standard Arabic (MSA) and different Arabic dialects (DA). With the prevalence of internet usage among Arab...
Article
Full-text available
تسارع في العقود الاخيرة تطوير تقنيات الذكاء الاصطناعي، مثل تقنية التعرف على الكلام، وتسارعت أيضًا التطبيقات التي تعتمد على تقنية التعرف على الكلام حيث تقلل هذه التطبيقات وقت وجهد إنجاز المهام المرغوبة من المستخدم. تعتمد هذه التقنيات في عملها على معالجة اللغة الطبيعية واستخدام تقنيات تعليم الالة مثل الشبكات العصبية. في هذه الد ا رسة، تم تصميم نظام ل...
Conference Paper
Full-text available
This study evaluates the impact of using Stemming and Stop-words removal techniques on machine learning classifiers, Support Vector Machine (SVM) and Logistic Regression (LR), in detecting sentiment from Libyan dialect poetry. The lack of Arabic Natural Language Process resources has made sentiment analysis for Arabic a challenging task compared to...
Conference Paper
Full-text available
Recently, digital images have become widely used in various fields, attracting the attention of researchers in the field of digital image processing. This research focuses on detecting a type of image forgery using Convolutional Neural Networks (CNN), specifically the copy-move forgery. In this forgery, a portion of the image is copied and pasted o...
Conference Paper
Arabic dialects are commonly used on social media platforms by Ara-bic speakers to express their opinions and connect with each other. However, due to the lack of standardized rules or grammars, analyzing Arabic dialects with NLP tools can be more challenging than standard Arabic. Moreover, the poems domain within Arabic dialects is considered to b...
Article
Artificial Intelligence (AI) has become pervasive, enabling transformative advancements in various industries including smart city, smart healthcare, smart manufacturing, smart virtual world and the Metaverse. However, concerns related to risk, trust, and security are emerging with the increasing reliance on AI systems. One of the most beneficial a...
Chapter
Arabic people use Arabic dialects on social media platforms to express their opinions and connect. Due to the absence of standard rules or grammar, Arabic dialects are more challenging for NLP tools to analyze than standard Arabic. While most review studies in this field have focused on highly indexed databases such as Scopus, Web of Science, and I...
Conference Paper
Full-text available
The development of artificial intelligence technologies, such as speech recognition technology, has accelerated in recent decades. Applications that rely on speech recognition technology, such as voice assistants, have also accelerated, and these applications reduce job completion time and effort. This technology relies on its work on the handling...
Conference Paper
Full-text available
في الآونة الأخيرة، أصبحت الصور الرقمية مستخدمة في العديد من المجالات، حيث أصبحت محط اهتمام الباحثين في مجال معالجة الصور الرقمية. يركز هذا البحث على الكشف عن نوع من أنواع التزوير في الصور باستخدام الشبكات العصبية التلافيفية CNN، ويتم في هذا التزوير نسخ جزء من الصورة ولصقه على جزء آخر من الصورة (تزوير نقل-النسخ Copy-move). حيث يقترح البحث هيكل شبكة...
Article
Full-text available
The advent of technological advancements in the era of globalization has given significant advantages upon developing nations. However, it has also led to certain drawbacks, notably the increase of cybercrimes such as Internet fraud (commonly known as scams). Among the contributing factors to this issue in Malaysia are the low level of public aware...
Article
Full-text available
Technology and online systems were enhancing the way people work. An online system for evaluating practicum students is vital as the number of students participating in practicum sessions each semester continues to grow. The traditional method of manual evaluation can be time-consuming and tedious for supervisors, and maintaining and organising stu...
Conference Paper
Full-text available
Sentiment Analysis (SA) is one of the Natural Language Processing (NLP) techniques used to determine the polarity of a text, whether it is positive or negative (Omar et al., 2022). SA is extensively utilized to automatically extract people's opinions on various subjects, such as events, services, products, and more, expressed in different forms suc...
Article
Full-text available
Drivers of cars always face issues and some difficulties during driving the car on the road with their car’s tires. Puncture of tires, tube burst, or bends in rims of tires are actions or events surely lead to complete stop moving the car, and usually without earlier notification. The main idea of doing this study is to design a robot which acts as...
Preprint
Supervised learning is one of the most common machine learning tasks. Many machine learning algorithms follow the structure of supervised learning such as K Nearest Neighbour (KNN), Decision Tree, Support Vector Machine, and others. Every algorithm is designed based on special style which can perform well in some cases and not in other cases. The p...
Article
Full-text available
The drivers of cars always face issues and some difficulties during driving the car on the road with their car's tires. Puncture of tires, tube bursts, or bends in rims of tires are actions or events that surely lead to a complete stop moving the car, usually without earlier notification. The main idea of doing this study is to design a robot which...
Article
Full-text available
Mobile health applications (mHealth) are instantly and easily accessible to ordinary users of mobile devices, so mHealth applications can improve healthcare services availability and the ability to communicate information easily and quickly. Our proposed application scope contains all hospitals, a list of private doctor's clinics with their address...
Article
Full-text available
E-learning became the main medium of education in the world for the past two years. COVID-19 virus has pushed all the universities and academic institutions to utilize and activate E-learning platforms and systems. The sudden and urgent transformation from the regular traditional learning system to E-learning system has involved many challenges and...
Article
In latest decades, the identifications of humans have become very important for the routine activities like getting permission to enter to a secure location and for many applications. However, the security with high level is needed with easy way for user interaction via Biometric Verification (BV). (BV) can help to identify the authorized person ba...
Conference Paper
As the number of devices connected to the Internet increase and the amount of data available online grow, the cyber-attacks will keep increasing in number and their severity. For Malaysia specifically, as of the second quarter of 2022, a total of 44.2 million accounts have been breached putting the security, privacy, and confidentiality of the acco...
Article
Full-text available
Traffic accidents around the world has created a significant amount of panic, fear and concern globally as lives are at stake due to the way people drive on the road and also the pedestrians who are also using the road. Solutions on how to reduce road accidents have been discussed, adopted and implemented in various countries and there have been te...
Article
Full-text available
Online learning has gained substantial traction since the popularization of Massive Open Online Courses (MOOCs) over the last decade. After the dawn of the Covid-19 pandemic, online learning has become an indispensable mode of modern-day education. All educational institutions around the world are now compelled to switch to online classes as a phys...
Article
Full-text available
As the Massive Open Online Courses (MOOC) became widely popular since the last decade, online learning has acquired substantial traction. Then, as the Covid-19 pandemic started, this method of education became indispensable. All educational institutes all around the world were compelled to switch to online classes as a safer and more flexible optio...
Conference Paper
Full-text available
In various application domains such as education, crime prevention, commerce, and biomedicine, the volume of digital data in various application domains is increasing rapidly, and retrieving the information from the storage media is still challenging. The image retrieval systems aim to retrieve images from large image databases depending on the sim...
Article
Full-text available
With the popularization of mobile information tools, handwriting recognition technology has also entered the era of large-scale applications. Online handwriting recognition enables users to input text most naturally and conveniently, easy to learn and use. Any handwritten text recognition system requires a large dataset to be trained and tested wit...
Article
Full-text available
With advances in machine learning techniques, handwriting recognition systems have gained a great deal of importance. Lately, the increasing popularity of handheld computers, digital notebooks, and smartphones give the field of online handwriting recognition more interest. In this paper, we propose an enhanced method for the recognition of Arabic h...
Article
Full-text available
In this paper, we measure the performance of supervised learning algorithms on imbalanced class datasets. Supervised learning is considered to be the most advanced and mature from other types of learning in machine learning. On the other hand, imbalanced class data sets refer to an unequal amount of data for each class in the data sets. Many real-w...
Article
Full-text available
Due to the increased rate of fire accidents which cause many damages and losses to people souls, material, and property in Basra city. The necessity of analyzing and mining the data of the fire accidents became an urgent need to find a solution. The need increased for a solution that helps to mitigate and reduce the number of accidents. In this pap...
Article
This study presents the "Automation Safety Message System" that basically depends on an Arduino device. The system has the ability to solve problems that face many car owners nowadays. Due to the great progress in scientific development, common sensors convert measurement of physical phenomena into an electrical signal accurately and easily. Th...
Article
Full-text available
Information security is considered as a very critical issue in the transmission of information. Therforelossing or threatening the information transmission will therefore be a great loss in the process of transmitting the information. Recently, Lightweight block cipher Algorithms have gained wide acceptance and it is used in restricted applications...
Article
Full-text available
Keyboard is the main input device for personal computers and mobile phones. However, keyboards usage are no longer the only way to enter data into computers and phones for several reasons. Among these reasons are the size of electronic devices, the nature of their work, and the need to use relatively larger screens. In fact, these type of touch scr...
Article
Full-text available
this paper presents a new social-networking concept and solution for effective appointment-scheduling and status communication between groups of people. The concept is driven by the widespread adoption of social-networking platforms among people as a result of daily internet usage. People became connected most of the time with other users of a soci...
Conference Paper
Full-text available
Scientific research is considered as one of the criteria for the development of societies and its way to solve many problems facing the societies. Most of the technologies those are currently used are the outputs of scientific research. One of the most important pillars of scientific research is documenting the steps and results of scientific resea...
Article
Full-text available
In this Internet era, users' awareness of information technology ethics and information security is considerably affecting how information technology is used. Among users, higher education staff members comprise a noteworthy case of being violators of computer security and computer ethics while using Internet applications in their daily lives. This...
Article
Full-text available
The idea of this study is studying the Islamic applications for reading the Quran Book applications or what is known as the electronic Quran in smart devices which uses (Android). The aims of study were to investigate the problems, constraints, shortcomings which hinder the use of these applications and to reach a comprehensive recommendation on th...
Article
Full-text available
Recently, the field of deep learning has received increased attention due to its high accuracy. A common deep learning technique is Convolutional Neural Networks (CNN), which is as a construction of trainable multi-stages using multiple phases. In this paper, we use a type of CNN called AlexNet to classify human retinal images into 'normal' or 'hav...
Article
Full-text available
Recently, deep learning approaches have been getting more attention in many research fields. Medical imaging field has been attracting widely by deep learning techniques. An example of this field categories are images segmentations, images registration, images classification and retrieval of images database. This paper is presenting a number of exp...
Article
Full-text available
Over the world, companies often have huge datasets those are stored in databases. The huge size could make difficulty of data analysis because data are more complex in terms of attributes number and number of cases. To overcome this problem could be done by using a sufficient number of attributes and cases before mining this dataset. In data mining...
Chapter
Arabic language is considered as the primary language in most parts of the Arabic world. It is spoken as a first language by more than 280 million people, and more than 250 million as a secondary spoken language. In pattern recognition field, several studies were focused on Arabic language with textual or voice methods. In this paper, an online han...
Conference Paper
في هذا الوقت أصبحت المواد الغذائية لها مشاكل كثيرة وهذه المشاكل لها تأثير على صحة الانسان لما يدخل في صناعتها من مواد حافظة ومواد ملونة ومواد معطرة وهذه المواد تسبب خط ا ر على صحة الانسان فمنها ما يسبب مرض السرطان ومشاكل صحية أخرى وبعض المواد الغذائية قد تحتوي على دهن الخنزير والذي هو محرم شرعا, وهذه المواد المسرطنة أو التي تحتوي على دهن الخنزير لا...
Article
Full-text available
Online text recognition systems have been continually given due importance these days globally because of the rapidly developing touch screen gadgets. However, it has been difficult to utilize keyboards and external mouse-like inputs in significantly tinier devices which consequently paved the way to current researched based scientists to look for...
Article
Full-text available
Online text recognition systems have been continually given due importance these days globally because of the rapidly developing touch screen gadgets. However, it has been difficult to utilize keyboards and external mouse-like inputs in significantly tinier devices which consequently paved the way to current researched based scientists to look for...
Conference Paper
The typical Online Handwritten Text Recognition System contains four main phases which are: preprocessing, feature extraction, recognition, and post-processing phases. Preprocessing phase aims to reduce or remove imperfections caused during acquisition step. This phase is also used to minimize handwriting variations irrelevant for pattern classific...
Conference Paper
Online applications and computer applications software are increasingly grown and one of the most cornerstone issues of these applications is the usability issue. Investigating the usability of using any technique is very important before distributing that technique. In this paper, we investigate an authentication systems based on recognition graph...
Article
Full-text available
يعتبر التعرف الضوئي للنصوص من أحد فروع التعرف الضوئي باستخدام الحاسوب. حيث يلقى هذا المجال إقبالا كبيرا من البحاث حول العالم لما له من أهمية كبيرة في التعامل في إدخال النصوص بطريقة جديدة تختلف على الطريقة التقليدية وهي باستخدام لوحات المفاتيح. يمر نظام التعرف الضوئي على النصوص بمراحل مختلفة تختلف في الوظيفة والهدف، حيث تتسلسل المراحل من إدخال النص...
Chapter
Text recognition is one of the most interesting subjects in language recognition. It was investigated and studied by several researchers who worked on characters in general that might by handwritten or typewritten. These researchers tried to cover diverse areas in this subject by discussing, analyzing, comparing and implementing algorithms for each...
Conference Paper
Full-text available
Nowadays, online text recognition systems are being given tremendous attention worldwide due to the fast growth of touch screen devices industry. Although, keyboards and mice devices have not become/are not applicable to be used by smaller devices, these reasons pushed researchers to focus on new techniques which are able to design this kind of sys...
Conference Paper
Recently, online character recogniti gotten attention everywhere due to the raped screen devices industry. Furthermore, key devises become inapplicable to be included These reasons would open the gate for techniques which can enrich and enhan approaches. These online approaches can be u different texts like letters, digits, or symbols. online s...
Article
Full-text available
In this paper, an online Arabic handwritten words database is presented to be the first online Quranic handwritten words dataset. The dataset was collected naturally using Acer computer tablet 1.5 GHz core i3 by writing the words on a smooth touch screen using a special pen stylus. Here, a platform interface was designed to collect the handwritten...
Conference Paper
Same as Arabic scripts, Arabic mathematical symbols have some differences with Latin mathematical symbols shape. Although, Arabic Mathematical symbols follow Latin mathematical from the structure of writing the symbols, Arabic symbols have special shape like writing direction, cursive style, and written by Arabic characters. In fact, these symbols...
Article
Full-text available
The typical online recognition system contains of main four phases which are: Preprocessing, Feature extraction, Recognition, and post-processing phases. Preprocessing phase aims to reduce or remove imperfections caused by acquisition devices, and to minimize handwriting variations irrelevant for pattern classification which may exist in the acquir...
Poster
Full-text available
This study describes an online handwriting recognition system for the Arabic text. Recognition of Arabic text is a difficult problem since it is naturally both cursive and unconstrained. This work introduces a modified alignment matching algorithm to provide solutions for most of the difficulties inherent in recognizing Arabic text. This work consi...
Conference Paper
Nowadays, keyboards and mice are the basic input devices for personal computers. Nevertheless, these devices may not remain as the only way of transmitting electronic data to computers. Other methods may become necessary, particularly with regard to the size of newer mobile devices and the method of transmission. Hand-held computers, mobile technol...
Conference Paper
Nowadays, keyboards and mice are the basic input devices for personal computers. Nevertheless, these devices may not remain as the only way of transmitting electronic data to computers. Other methods may become necessary, particularly with regard to the size of newer mobile devices and the method of transmission. Hand-held computers, mobile technol...
Conference Paper
Online recognition of Arabic handwritten text has been an ongoing research problem for many years. Generally, online text recognition field has been gaining more interest lately due to the increasing popularity of hand-held computers, digital notebooks and advanced cellular phones. Most of the online text recognition systems consist of three main p...
Conference Paper
Online recognition of Arabic handwritten text has been an on-going research problem for many years. Generally, online text recognition field has been gaining more interest lately due to the increasing popularity of hand-held computers, digital notebooks and advanced cellular phones. However, different techniques have been used to build several onli...
Poster
Full-text available
This study describes an online handwriting recognition system for the Arabic text. Recognition of Arabic text is a difficult problem since it is naturally both cursive and unconstrained. This work introduces a modified alignment matching algorithm to provide solutions for most of the difficulties inherent in recognizing Arabic text. This work consi...
Conference Paper
This paper presents and compares techniques that have been used to segment Arabic handwriting scripts in online recognition systems. Those techniques attempt to segment cursive Arabic words into characters, or segment characters into small strokes that can be recognized via the recognition system. The structure and strategy of those reviewed techni...
Chapter
Word and text recognition field have become an active field since many years. Many methods have been improved for several languages and used for printed or handwritten scripts and used two different ways of processing which are online and offline way. However, researches and studies for Arabic language are still few comparing with other languages d...

Questions

Questions (3)
Question
Hello, I am looking for a dataset for recommending services for disabled people?
Thank you

Network

Cited By