Sherzod Turaev

Sherzod Turaev
  • PhD
  • Professor (Associate) at United Arab Emirates University

About

199
Publications
83,903
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,176
Citations
Introduction
Research interests: theoretical computer science, regulated rewriting systems, DNA computing, AI, machine learning, AI agents
Current institution
United Arab Emirates University
Current position
  • Professor (Associate)
Additional affiliations
January 2009 - December 2009
Otto-von-Guericke University Magdeburg
Position
  • Researcher
November 2018 - August 2019
International University of Sarajevo
Position
  • Professor (Associate)
October 2009 - August 2012
UPM
Position
  • PostDoc Position
Education
March 2005 - September 2007
Universitat Rovira i Virgili
Field of study
  • Computer Science
March 2005 - February 2010
Universitat Rovira i Virgili
Field of study
  • Computer Science
December 1994 - February 2001
National University of Uzbekistan
Field of study
  • Mathematics

Publications

Publications (199)
Article
Full-text available
Introduction: Skin diseases significantly impact individuals' health and mental wellbeing. However, their classification remains challenging due to complex lesion characteristics, overlapping symptoms, and limited annotated datasets. Traditional convolutional neural networks (CNNs) often struggle with generalization, leading to suboptimal classific...
Article
Full-text available
Background: Neurodegenerative diseases (NGD) encompass a range of progressive neurological conditions, such as Alzheimer’s disease (AD) and Parkinson’s disease (PD), characterised by the gradual deterioration of neuronal structure and function. This degeneration manifests as cognitive decline, movement impairment, and dementia. Our focus in this in...
Article
Full-text available
Background and Objectives: Brain tumors are complex diseases that require careful diagnosis and treatment. A minor error in the diagnosis may easily lead to significant consequences. Thus, one must place a premium on accurately identifying brain tumors. However, deep learning (DL) models often face challenges in obtaining sufficient medical imaging...
Conference Paper
Full-text available
The integration of artificial intelligence (AI) into the medical field has revolutionized documentation and diagnosis. However, the detection of AI-generated text within medical records remains a crucial task. This paper describes a dual-task learning framework using the ELECTRA model for detecting AI-generated medical texts and performing named en...
Article
Full-text available
This research paper focuses on the applications and challenges of wireless sensor networks (WSNs). WSNs consist of small, low-cost sensors that can collect and process data in various fields such as military, environmental monitoring, health, home appliances, and other commercial applications. The paper discusses the benefits of structured deployme...
Article
Deoxyribonucleic Acid (DNA) and graph partitioning are two distinct fields of study which can be linked in the structure of biological networks. Graph partitioning has been extensively studied but not its application in the biological field. This research explored on the application of spectral graph partitioning in DNA splicing, aiming to simulate...
Article
The structure of deoxyribonucleic acid (DNA) consists of two nucleotides chained together where nucleotides are long strands of DNA bases, namely Adenine (A), Cytosine (C), Guanine (G) and Thymine (T), linked together by sugar and phosphates molecules. DNA molecule can be represented by a graph as a mathematical model. In graph theory, finding the...
Conference Paper
In formal language theory, a grammar is a set of production rules that describes the possible strings in a given language. Context-free grammars, the most applicable type of the grammars, may contain production rules that do not generate any string of the language or affect the string generation processes using several unnecessary steps. Thus, the...
Article
Full-text available
In recent years, online reviews have become increasingly important in promoting various products and services. Unfortunately, writing deceptive reviews has also become a common practice to promote one’s own business or tarnish the reputation of competitors. As a result, identifying fake reviews has become an intense and ongoing area of research. Th...
Chapter
Full-text available
Undeniably, visual impairment severely affects the quality of life and impacts many daily activities of visually impaired individuals. Visually impaired individuals have difficulty navigating on side-walks. There are many assistive tools available for navigational assistance for visually impaired individuals. The majority of assistive technologies...
Article
Full-text available
The cooperative, connected, and automated mobility (CCAM) infrastructure plays a key role in understanding and enhancing the environmental perception of autonomous vehicles (AVs) driving in complex urban settings. However, the deployment of CCAM infrastructure necessitates the efficient selection of the computational processing layer and deployment...
Article
Full-text available
The Zero Trust safety architecture emerged as an intriguing approach for overcoming the shortcomings of standard network security solutions. This extensive survey study provides a meticulous explanation of the underlying principles of Zero Trust, as well as an assessment of the many strategies and possibilities for effective implementation. The sur...
Article
Full-text available
italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Body language refers to the unspoken communication conveyed through human body actions like body movements and postures, limb gestures, and facial and other bodily expressions. It acts as a transparent medium, exposing an individual’s emotions, attitud...
Article
Full-text available
Natural disasters have the potential to inflict damage to building structures, which prompting the structural engineers striving to build buildings that are both safer and durable. This research endeavor aims to enhance the stability of a structure by using control strategy to reduce the hazards of earthquake-induced damage. As a consequence, a hyb...
Article
Full-text available
Nowadays, countries face a multitude of electronic threats that have permeated almost all business sectors, be it private corporations or public institutions. Among these threats, advanced persistent threats (APTs) stand out as a well-known example. APTs are highly sophisticated and stealthy computer network attacks meticulously designed to gain un...
Preprint
Full-text available
Cardiovascular diseases (CVDs) are prevalent disorders affecting the heart or blood arteries. Early disease detection significantly enhances survival prospects, thus emphasizing the necessity for accurate prediction methods. Emerging technologies, such as machine learning (ML), present promising avenues for more precise prediction of CVDs. However,...
Article
Full-text available
Quality control and assurance plays a fundamental role within higher education contexts. One means by which quality control can be performed is by mapping the course learning outcomes (CLOs) to the program learning outcomes (PLO). This paper describes a system by which this mapping process can be automated and validated. The proposed AI-based syste...
Article
Full-text available
Real-world applications often involve imbalanced datasets, which have different distributions of examples across various classes. When building a system that requires a high accuracy, the performance of the classifiers is crucial. However, imbalanced datasets can lead to a poor classification performance and conventional techniques, such as synthet...
Article
Full-text available
Real-world applications often involve imbalanced datasets, which have different distributions of examples across various classes. When building a system that requires a high accuracy, the performance of the classifiers is crucial. However, imbalanced datasets can lead to a poor classification performance and conventional techniques, such as synthet...
Article
Full-text available
This literature review explores the impact of ChatGPT on businesses. ChatGPT has been widely adopted in various companies to generate content. This review examines the existing research on the benefits and drawbacks of ChatGPT in business settings, including its effect on business management and operations. Through an analysis of articles and acade...
Article
Full-text available
The COVID-19 pandemic forced governments to implement strategies for contact tracing due to the disease’s ease of spread. The Malaysian government has sought to develop and implement a digital contact-tracking application to make it easier and faster to detect the spread; the system has become an integral part of the exit strategy from mandated loc...
Article
Full-text available
Cellular vehicle-to-everything (C-V2X) is one of the enabling vehicular communication technologies gaining momentum from the standardization bodies, industry, and researchers aiming to realize fully autonomous driving and intelligent transportation systems. The 3rd Generation Partnership Project (3GPP) standardization body has actively been develop...
Article
Full-text available
This paper presents an automatic visual inspection of exterior surface defects of oil tanks using unmanned aerial vehicles (UAVs) and image processing with two cascading fuzzy logic algorithms. Corrosion is one of the defects that has a serious effect on the safety of the surface of oil and gas tanks. At present, human inspection, and climbing robo...
Article
Full-text available
Autonomous vehicles and smart roads are not new concepts and the undergoing development to empower the vehicles for higher levels of automation has achieved initial milestones. However, the transportation industry and relevant research communities still require making considerable efforts to create smart and intelligent roads for autonomous driving...
Article
Full-text available
Wireless Body Area networks (WBANs) have been adopted extensively in academic and industrial research and development in recent years. WBANs promise to provide a suitable environment for remote patient monitoring and enable caregivers to intervene in case of abnormal health conditions. However, WBANs sensors are resource-constrained and face challe...
Article
Full-text available
Body language is a nonverbal communication process consisting of movements, postures, gestures, and expressions of the body or body parts. Body language expresses human feelings, thoughts, and intentions. It also reveals physical and psychological health conditions: abnormal activities inform peoples’ health conditions, facial expressions indicate...
Article
Full-text available
Phoneme classification performance is a critical factor for the successful implementation of a speech recognition system. A mispronunciation of Arabic short vowels or long vowels can change the meaning of a complete sentence. However, correctly distinguishing phonemes with vowels in Quranic recitation (the Holy book of Muslims) is still a challengi...
Article
Full-text available
Automatic image caption prediction is a challenging task in natural language processing. Most of the researchers have used the convolutional neural network as an encoder and decoder. However, an accurate image caption prediction requires a model to understand the semantic relationship that exists between the various objects present in an image. The...
Article
Full-text available
In recent decades, epidemic and pandemic illnesses have grown prevalent and are a regular source of concern throughout the world. The extent to which the globe has been affected by the COVID-19 epidemic is well documented. Smart technology is now widely used in medical applications, with the automated detection of status and feelings becoming a sig...
Article
Full-text available
This paper aims to develop a new mobile robot path planning algorithm, called generalized laser simulator (GLS), for navigating autonomously mobile robots in the presence of static and dynamic obstacles. This algorithm enables a mobile robot to identify a feasible path while finding the target and avoiding obstacles while moving in complex regions....
Preprint
Full-text available
Quality control and assurance plays a fundamental role within higher education contexts. One means by which quality control can be performed is by mapping the course learning outcomes (CLOs) to the program learning outcomes (PLO). This paper describes a system by which this mapping process can be automated and validated. The proposed AI-based syste...
Conference Paper
Artificial intelligence applications are widely used in computer games, financial analysis, and real-time systems. In this paper we will consider artificial intelligence as computer systems that can successfully achieve their goals in a “complex environment”. It is known from algorithm theory that any algorithm has a morphism into a finite automato...
Article
Full-text available
Given the current COVID-19 pandemic, medical research today focuses on epidemic diseases. Innovative technology is incorporated in most medical applications, emphasizing the automatic recognition of physical and emotional states. Most research is concerned with the automatic identification of symptoms displayed by patients through analyzing their b...
Article
Full-text available
In DNA computing, there are different computational models which are based on operations of DNA molecules and the concept of formal language theory. Watson-Crick automaton is a mathematical model that represents the biological properties of DNA; whereas a sticker system is another DNA computing model which uses the sticker operation to form complet...
Chapter
The main purpose for carrying out research on the adoption of the Internet banking services is due to the lack of empirical studies on Yemeni Internet banking services. The objective of this study is to explore and investigate the factors of technology–organization–environment theory (TOE) that play the main role in the implemention of Internet ban...
Article
Full-text available
Sign Language recognition is one of the essential and focal areas for researchers in terms of improving the integration of speech and hearing-impaired people into common society. The main idea is to detect the hand gestures of impaired people and convert them to understandable formats, such as text by leveraging advanced approaches. In this paper,...
Article
Full-text available
Arabic handwriting is slightly different from the handwriting of other languages; hence it is possible to distinguish the handwriting written by the native or non-native writer based on their handwriting. However, classifying Arabic handwriting is challenging using traditional text recognition algorithms. Thus, this study evaluated and validated th...
Article
Full-text available
This paper presents a development of a novel path planning algorithm, called Generalized Laser simulator (GLS), for solving the mobile robot path planning problem in a two-dimensional map with the presence of constraints. This approach gives the possibility to find the path for a wheel mobile robot considering some constraints during the robot move...
Article
Full-text available
Modeling low level features to high level semantics in medical imaging is an important aspect in filtering anatomy objects. Bag of Visual Words (BOVW) representations have been proven effective to model these low level features to mid level representations. Convolutional neural nets are learning systems that can automatically extract high-quality r...
Article
Full-text available
Radio frequency identification (RFID) is a rapidly developing technology, and RFID sensors have become important components in many common technology applications. The passive ultra-high frequency (UHF) tags used in RFID sensors have a higher data transfer rate and longer read range and usually come in unique small and portable application designs....
Article
Full-text available
Skyline queries have been widely used as an effective query tool in many contemporary database applications. The main concept of skyline queries relies on retrieving the non-dominated tuples in the database which are known skylines. In most database applications, the contents of the databases are dynamic due to the continuous changes made towards t...
Article
Full-text available
Splicing system was introduced by Head in 1987 in order to explore the recombinant behaviour of deoxyribonucleic acid (DNA) strands in the presence of restriction enzymes and ligases. Restriction enzymes cut the DNA strands into a left - pattern and right-pattern while the ligases recombine the left-pattern of the first string with the right-patter...
Article
Substitution boxes (S-Boxes) are critical components of numerous block ciphers deployed for nonlinear transformation in the cipher process where the nonlinearity provides important protection against linear and differential cryptanalysis. Classical S-Boxes are represented by predefine fixed table structures which are either use for Data Encryption...
Article
Full-text available
A binary grammar is a relational grammar with two nonterminal alphabets, two terminal alphabets, a set of pairs of productions and the pair of the initial nonterminals that generates the binary relation, i.e., the set of pairs of strings over the terminal alphabets. This paper investigates the binary context-free grammars as mutually controlled gra...
Article
Full-text available
In DNA computing, there are various formal language theoretical approaches that involves the recombinant behavior of DNA sequences. A Watson-Crick automaton is a mathematical model that represents the biological properties of DNA based on the Watson-Crick complementarity of DNA molecules. Meanwhile, a sticker system is another DNA computing models...
Conference Paper
Head in 1987 was the first person to introduce the concept of splicing system as a theoretical model for DNA based computation using splicing operation. Splicing operation is a method of cutting and recombining DNA molecules under the influence of restriction enzymes such as ligase. Previous researches have proven that splicing systems with finite...
Conference Paper
In DNA computing, a sticker system is a computing mechanism involving the Watson-Crick complementarity of DNA molecules. The sticker system is known as a language generating device based on the sticker operation which is analyzed through the concept of formal language theory. The grammar of a formal language can be described by determining finite s...
Article
Full-text available
When will the coronavirus end? Are the current precautionary measures effective? To answer these questions it is important to forecast regularly and accurately the spread of COVID-19 infections. Different time series forecasting models have been applied in the literature to tackle the pandemic situation. The current research efforts developed few o...
Article
Full-text available
Financial institutions in Bosnia and Herzegovina have adopted and implemented various security measures in preventing production of counterfeited banknotes as well as security measures in detecting counterfeited banknotes. Despite that, there are still many cases of money counterfeiting being reported in this specific country. This happen due to va...
Article
Full-text available
The paper reviews the usage, development and implementation of keystroke dynamics as a viable authentication system. AI methods are advancing, but we are still lacking biometric authentication systems in modern software which is being used daily. This paper shows the usage of long short-term memory layers for solving problems like keystroke dynamic...
Article
Full-text available
A binary grammar is a relational grammar with two nonterminal alphabets, two terminal alphabets, a set of pairs of productions and the pair of the initial nonterminals that generates the binary relation, i.e., the set of pairs of strings over the terminal alphabets. This paper investigates the binary context-free grammars as mutually controlled gra...
Article
Full-text available
A binary grammar is a relational grammar with two nonterminal alphabets, two terminal alphabets, a set of pairs of productions and the pair of the initial nonterminals that generates the binary relation, i.e., the set of pairs of strings over the terminal alphabets. This paper investigates the binary context-free grammars as mutually controlled gra...
Article
Full-text available
Data incompleteness becomes a frequent phenomenon in a large number of contemporary database applications such as web autonomous databases, big data, and crowd-sourced databases. Processing skyline queries over incomplete databases impose a number of challenges that negatively influence processing the skyline queries. Most importantly, the skylines...
Article
Full-text available
This paper presents a linear and nonlinear stochastic distribution for the interactions in multi-agent systems (MAS). The interactions are considered for the agents to reach a consensus using hetero-homogeneous transition stochastic matrices. The states of the agents are presented as variables sharing information in the MAS dynamically. The paper s...
Article
Full-text available
This article explores nonlinear convergence to limit the effects of the consensus problem that usually occurs in multi-agent systems. Most of the existing research essentially considers the outline of linear protocols, using complex mathematical equations in various orders. In this work, however, we designed and developed an alternative nonlinear p...
Article
DNA computing, or more generally, molecular computing, is a recent development on computations using biological molecules, instead of the traditional silicon-chips. Some computational models which are based on different operations of DNA molecules have been developed by using the concept of formal language theory. The operations of DNA molecules in...
Article
Full-text available
In hospital environments around the world bacterial contamination is prevalence. One of the most commonly found bacteria is the Acinetobacter Baumannii. It can cause unitary tract, lung, abdominal and central nervous system infection. This bacteria is becoming more resistant to antibiotics. Thus, identification of the non-resistant from the resista...
Article
Full-text available
Consensus problems in multi agent systems (MAS) are theoretical aspect convergence of doubly stochastic quadratic operators. This work has presented the dynamic classifications of extreme doubly stochastic quadratic operators (EDSQOs) on finite-dimensional simplex (FDS) based on the limit behaviour of the trajectories. The limit behaviour of the tr...
Article
Full-text available
Sticker systems and Watson-Crick automata are two modellings of DNA molecules in DNA computing. A sticker system is a computational model which is coded with single and double-stranded DNA molecules; while Watson-Crick automata is the automata counterpart of sticker system which represents the biological properties of DNA. Both of these models use...
Article
Full-text available
Muslims are concern with the Halal status of food products sold in the supermarkets. Many products that are imported from overseas are not certified by JAKIM. In this paper, we proposed a conceptual model for benchmarking food products against certified Halal products. Our motivation is to provide similarity measurement between certified and non-ce...
Article
Full-text available
Sticker system is a computer model which is coded with single and double-stranded molecules of DNA; meanwhile, Watson-Crick automata is the automata counterpart of the sticker system representing the biological properties of DNA. Both are the modelings of DNA molecules in DNA computing which use the feature of Watson-Crick complementarity. Formerly...
Article
Full-text available
Fundamental quantum gates can be implemented effectively using adiabatic quantum computation or circuit model. Recently, Hen combined the two approaches to introduce a new model called controlled adiabatic evolutions [I. Hen, Phys. Rev. A, 91(2) (2015) 022309]. This model was specifically designed to implement one and two-qubit controlled gates. La...
Article
Full-text available
Given the significance of skyline queries, they are incorporated in various modern applications including personalized recommendation systems as well as decision-making and decision-support systems. Skyline queries are used to identify superior data items in the database. Most of the previously proposed skyline algorithms work on a complete databas...
Article
Full-text available
DNA computing, or more generally, molecular computing, is a recent development at the interface of computer science and molecular biology. In DNA computing, many computational models have been proposed in the framework of formal language theory and automata such as Watson-Crick grammars and sticker systems. A Watson-Crick grammar is a grammar model...
Article
Full-text available
This paper introduces a new variant of Petri net controlled grammars, namely a concurrently controlled grammar, where the control over the application of the productions of a grammar is realized by a Petri net with different parallel firing strategies. The generative capacity of these grammars is investigated with respect to transition labeling str...
Article
A Watson-Crick (WK) context-free grammar, a context-free grammar with productions whose right-hand sides contain nonterminals and double-stranded terminal strings, generates complete double-stranded strings under Watson-Crick complementarity. In this paper, we investigate the simplification processes of Watson-Crick context-free grammars, which lea...
Poster
Full-text available
This research focuses on introducing one type of static Watson-Crick grammars known as static Watson-Crick linear grammars with their computational power.
Article
This paper shows that Petri net control mechanisms in grammars can be considered to be a unifying approach to dierent controls and characterizations which are used in well-known families of languages such as matrix and vector languages.
Conference Paper
A Watson-Crick Petri net is a model that enhances a Petri net with the Watson-Crick complementarity feature adapted from DNA molecules. The transitions of a Watson-Crick Petri net are labelled with pairs of symbols, and a firing sequence of transitions of the Watson-Crick Petri net is considered as successful if and only if it produces complete dou...
Article
Full-text available
Cryptography is defined as a technique of transmitting information in a secretive manner so that only authorized people are able to read and process it. The main aim of cryptography is to make sure the message has been received by the receiver in a secure manner, and not being understood by anyone else but the receiver. Although there exist several...
Article
Full-text available
Nowadays, in most of the modern database applications, lots of critical queries and tasks cannot be completely addressed by machine. Crowd-sourcing database has become a new paradigm for harness human cognitive abilities to process these computer hard tasks. In particular, those problems that are difficult for machines but easier for humans can be...
Article
Full-text available
As a solution to the distributed multi-agent coordination, the problems of consensus or agreement have been widely explored and studied in the literature. This document provides an overview of consensus problems in multi-agent cooperative control with the goal of exposing the related literature and promote the research in this area. The document pr...
Article
Full-text available
This paper proposes nonlinear operator of extreme doubly stochastic quadratic operator (EDSQO) for convergence algorithm aimed at solving consensus problem (CP) of discrete-time for multi-agent systems (MAS) on n-dimensional simplex. The first part undertakes systematic review of consensus problems. Convergence was generated via extreme doubly stoc...
Article
Full-text available
A place-labelled Petri net controlled grammar is, in general, a context-free grammar equipped with a Petri net and a function which maps places of the net to productions of the grammar. The languages of place-labelled Petri net controlled grammar consist of all terminal strings that can be obtained by parallel application of the rules of multisets...
Article
Full-text available
Insertion is an operation in formal language theory that generalizes the operation of concatenation of words, where its variants allow the operation in different ways. Parallel insertion is a variant of insertion that simultaneously adds words between all letters of a word and also at the right and left extremities. In previous research, restrictio...
Article
Full-text available
This study focusses on defining a new variant of regulated grammars called multiset controlled grammars as well as investigating their computational power. In general, a multiset controlled grammar is a grammar equipped with an arithmetic expression over multisets terminals where to every production in the grammar a multiset is assigned, which repr...
Article
In this paper, we consider nonlinear models of DeGroot, quadratic stochastic operators (QSO) and doubly stochastic quadratic operators (DSQO) with fractional degree for consensus problem in multi-agent systems (MAS). By the limit behaviour of nonlinear approach, we discuss the convergence of the solutions of the models considered. The findings from...
Article
Multisets are very powerful and yet simple control mechanisms in regulated rewriting systems. In this paper, we review back the main results on the generative power of multiset controlled grammars introduced in recent research. It was proven that multiset controlled grammars are at least as powerful as additive valence grammars and at most as power...
Article
Full-text available
Beyond a shadow of a doubt, the studying of context-free grammars with restricted derivation trees known as tree controlled grammars have achieved plentiful remarkable results within formal language theory as demonstrated in a number of publications on this subject for the past forty five years. In principle, these grammars generate their languages...
Article
Full-text available
The performance has a central importance for all cryptosystems. This paper aims to provide a framework and platform to evaluate a performance of Modified Dӧmӧsi's Cryptosystem, a stream cipher based on finite automata, comparing to Data Encryption Standard. The performance is evaluated in terms of encrypting time and throughput.
Article
Full-text available
We define a complementary stochastic quadratic operator on finite-dimensional space as a new sub-class of quadratic stochastic operator. We give necessary and sufficient conditions for complementary stochastic quadratic operator.
Article
Full-text available
This technical note addresses the new nonlinear protocol class of doubly stochastic quadratic operators (DSQOs) for coordination of consensus problem in multi-agent systems (MAS). We derive the conditions for ensuring that every agent reaches consensus on a desired rate of the group's decision where the group decision value in its agent's initial s...
Conference Paper
Full-text available
The operation of insertion has been studied extensively throughout the years for its impact in many areas of theoreticalcomputer science such as DNAcomputing. First introduced as a generalization of the concatenation operation, many variants of insertion have been introduced, each with their own computational properties. In this paper, we introduce...
Article
Full-text available
This paper proposes a new symmetric cryptosystem based on nondeterministic finite automata. It is shown that nondeterminism allows to reduce the dependency of key automata on a large descriptional complexity and irreversibility of automata. Moreover, it is proven that the introduced cryptosystem has higher security and more efficient performance th...
Article
Full-text available
A place-labelled Petri net (pPN) controlled grammar is a context-free grammar equipped with a Petri net and a function which maps places of the net to the productions of the grammar. The language consists of all terminal strings that can be obtained by simultaneously applying the rules of multisets which are the images of the sets of the input plac...

Network

Cited By