Zaher Al Aghbari

Zaher Al Aghbari
University of Sharjah | US · Department of Computer Science

Doctor of Philosophy

About

188
Publications
40,775
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,926
Citations
Additional affiliations
September 2003 - September 2020
University of Sharjah
Position
  • Professor (Full)

Publications

Publications (188)
Article
Emailing is among the cheapest and most easily accessible platforms, and covers every idea of the present century like banking, personal login database, academic information, invitation, marketing, advertisement, social engineering, model creation on cyber-based technologies, etc. The uncontrolled development and easy access to the internet are the...
Article
Full-text available
With the emergence of GPS-equipped portable devices and Online Social Networks, geo-tagged textual data have been highly produced on a continuous basis, which can provide important information for various applications, such as marketing, disaster response, and so on. Therefore, processing continuous spatial-keyword queries over streaming data is a...
Article
Full-text available
Cloud service providers can offer virtual servers, with powerful processors and massive storage capacity for nominal per-use charges. With the underlying resources, the cloud allows data owners to trade capital expense for the variable cost. The auto-scaling features of the cloud can control the consumption of computing resources and hence the asso...
Preprint
Full-text available
Pedestrian Attribute Recognition (PAR) deals with the problem of identifying features in a pedestrian image. It has found interesting applications in person retrieval, suspect re-identification and soft biometrics. In the past few years, several Deep Neural Networks (DNNs) have been designed to solve the task; however, the developed DNNs predominan...
Preprint
Full-text available
This paper presents a pixel selection method for compact image representation based on superpixel segmentation and tensor completion. Our method divides the image into several regions that capture important textures or semantics and selects a representative pixel from each region to store. We experiment with different criteria for choosing the repr...
Preprint
Full-text available
In this paper, we propose a new adaptive cross algorithm for computing a low tubal rank approximation of third-order tensors, with less memory and demands lower computational complexity than the truncated tensor SVD (t-SVD). This makes it applicable for decomposing large-scale tensors. We conduct numerical experiments on synthetic and real-world da...
Article
Full-text available
Over the past few years, the on-demand transport services (e.g., Uber) have witnessed an unprecedented popularity due to its easy-to-adopt model (i.e., a passenger orders a taxi, a request is sent to all drivers in the vicinity, drivers accept/reject the order). Nonetheless, such a service is affected directly by multiple urban factors such as traf...
Article
Full-text available
Hate speech has become a phenomenon on social media platforms, such as Twitter. These websites and apps that were initially designed to facilitate our expression of free speech, are sometimes being used to spread hate towards each other. In the Arab region, Twitter is a very popular social media platform and thus the number of tweets that contain h...
Chapter
Full-text available
The number of extracted features from medical data, such as computer-aided diagnosis, has been known to be too large and affects the performance of the used classifiers. Moreover, the large number of input features affect the accuracy of the classifiers, such as the traditional machine learning classifier. Therefore, in this paper, we proposed the...
Article
Full-text available
Maintaining prolonged service lifetime and adequate quality of sensing coverage are the key challenges in constructing Wireless Sensor Network (WSN) based applications. As such networks usually operate in inhospitable and hostile environment, failures are ineludible and providing resilience is a necessity. However, it is challenging to satisfy the...
Article
Full-text available
Data collection is an important task in many mobile wireless sensor network (MWSN) applications. The energy of sensor nodes around the sink depletes rapidly due to transmitting large amounts of data from neighboring nodes. This problem can be mitigated through the use of intelligent mobile vehicles to collect the data. While traditional data collec...
Article
Full-text available
In wireless sensor networks, a Mobile Collector (MC) is used to gather data by periodically traversing the network to avoid hotspot or energy-hole issues. Although the MC’s data collection process and network performance can be enhanced by determining suitable set of Stop Points (SPs), it is challenging to find the best set of SPs and schedule an e...
Article
Full-text available
Although researchers have investigated multiple facets of fault tolerance, majority of them have overlooked fault tolerance in face structured WSNs. Motivated by this, we propose a Fault-Tolerant Coverage Preserving Strategy for Face Topology-based WSNs (FtCFt). Unlike existing methods of recovering failures by merging the adjacent faces, we propos...
Article
Full-text available
Emotion recognition is the process to detect, evaluate, interpret, and respond to people's emotional states and emotions, ranging from happiness to fear to humiliation. The COVID- 19 epidemic has provided new and essential impetus for emotion recognition research. The numerous feelings and thoughts shared and posted on social networking sites throu...
Article
Full-text available
Past studies reveal the benefits of using Mobile Sink in Wireless Sensor Networks to bring about increased data collection efficiency and overall network performance in numerous applications. While several MS data gathering methods have been proposed, most of them are less adaptive to changes in network topology and fails to modify the MS path suit...
Article
Full-text available
Feature vectors are extracted to represent objects in many classification tasks, such as text classification. Due to the high dimensionality of these raw feature vectors, the classification efficiency and accuracy are reduced. Therefore, reducing the size of feature vectors by selecting the relevant features that better represent the objects is an...
Article
Full-text available
Since the recent outbreak of COVID-19, many scientists have started working on distinct challenges related to mining the available large datasets from social media as an effective asset to understand people’s responses to the pandemic. This study presents a comprehensive social data mining approach to provide in-depth insights related to the COVID-...
Article
Full-text available
One of the most important requirements for effective UAV–WSN operations is to perform data collection in timely and safe manner. Identifying an effective path in an environment with various obstacles and ensuring that the path may efficiently cover the selected stop points for effective data collection are both necessary and difficult. We propose a...
Article
Full-text available
While several Mobile Sink (MS)-based data gathering methods have been proposed for Wireless Sensor Networks, most of them are less adaptive to changes in network topology, and the planned MS trajectory cannot be refined to accommodate node failures. Hence, a KD-Tree-based scheme (KDT) is proposed, which is an adaptive and robust algorithm that redu...
Article
Full-text available
An emergent solution to overcome the limitations of traditional multi-hop routing in wireless sensor networks (WSNs) is to use mobile collectors (MCs) for data gathering, thereby reducing energy consumed in internode communications. Most of the existing data collection approaches emphasize data gathering or network lifetime extension, without takin...
Article
Full-text available
Event detection from social media aims at extracting specific or generic unusual happenings, such as, family reunions, earthquakes, and disease outbreaks, among others. This paper introduces a new perspective for the hybrid extraction and clustering of social events from big social data streams. We rely on a hybrid learning model, where supervised...
Article
Full-text available
Event detection from social media aims at extracting specific or generic unusual happenings, such as, family reunions, earthquakes, and disease outbreaks, among others. This paper introduces a new perspective for the incremental extraction and clustering of social events from big social data streams. We present ‘E-ware’, a scalable and efficient bi...
Article
Wireless Sensor Networks based on Mobile Sinks (MS) are becoming more popular because of their benefits in enhancing performance and minimizing unequal energy usage of the nodes. While several MS data gathering methods have been proposed, most of them are less adaptive to changes in network topology and fails to modify the MS path suitably in respo...
Chapter
Full-text available
In recent years, the number of online social networks users is dramatically increased. Cyberbullying is a serious threat in online social networks especially toward children and teenagers. Victims are harassed by perpetrators even with no physical attendance. Cyberbullying causes psychological damage to victims resulting in anxiety, depression, and...
Article
Full-text available
The intelligent collaboration of Unmanned Aerial Vehicles (UAV) and Wireless Sensor Networks (WSN) can bring about increased data collection efficiency and overall network performance in numerous applications. Despite the success of different studies, UAV-WSN collaboration still faces many open challenges including trajectory planning, data collect...
Article
Wireless Sensor Network with Mobile Collectors (MCs) enable increased flexibility and convenience in data gathering for numerous large-scale applications. However, introducing MCs also brings a new set of challenges to overcome. To reduce the data delivery latency of the application, it is required to select the minimum number of Rendezvous Points...
Article
Influenza is a common seasonal disease that affects people worldwide. Quick reporting methods are needed to detect sudden influenza outbreaks so that health authorities can respond swiftly. Using social media posts to detect influenza related tweets may provide early insights about influenza outbreaks. In this paper, we introduce Deepluenza, a deep...
Chapter
With the increased demand for outsourcing databases, there is a demand to enable secure and efficient communications. The concern regarding outsourcing data is mainly providing confidentiality and integrity to the data. This paper proposes a novel solution to answering kNN queries at the cloud server over encrypted data. Data owners transform their...
Article
MATLAB was used to compute the effective thermal conduction of different samples of hard isotropic low porosity composites. The computational algorithms intended to use the Effective Medium Theory (EMT) Model to estimate the effective thermal conductivity ( k eff ) of homogeneous composites. It estimates k eff of a homogeneous mixture of components...
Article
Full-text available
Finding influential members in social networks received a lot of interest in recent literature. Several algorithms have been proposed that provide techniques for extracting a set of the most influential people in a certain social network. However, most of these algorithms find influential nodes based solely on the topological structure of the netwo...
Article
Full-text available
The tremendous growth of event dissemination over social networks makes it very challenging to accurately discover and track exciting events, as well as their evolution and scope over space and time. People have migrated to social platforms and messaging apps, which represent an opportunity to create a more accurate prediction of social development...
Conference Paper
Full-text available
After the recent outbreak of COVID-19, researchers have risen working on several challenges related to the mining of social data to learn about people’s reactions to the epidemic. Recent studies have largely focused on extracting current themes and inferring broad attitudes, with a particular emphasis on the English language. This study presents va...
Conference Paper
The popularity of social media together with the widespread of location-aware devices have let to the explosion of geo-tagged data. As a result, many interesting location-based services were developed. In particular, road traffic jam detection and analyzer service is of great importance to Intelligent Transportation Systems. Current works proposed...
Preprint
Full-text available
Maintaining prolonged service lifetime and adequate quality of sensing coverage are the key challenges in constructing Wireless Sensor Network (WSN) based applications. As such networks usually operate in inhospitable and hostile environment, failures are ineludible and providing resilience is a necessity. However, it is challenging to satisfy the...
Article
Full-text available
PurposeGlioblastoma is one of the most common and aggressive brain tumors in the world with a poor prognosis. A glioblastoma prognostication model has the potential to improve the cancer’s standard of care. No other paper has looked at using ensemble learning with a population database to predict multiple binary glioblastoma survival outcomes.Metho...
Article
Full-text available
We address the problem of facial expression analysis. The proposed approach predicts both basic emotion and valence/arousal values as a continuous measure for the emotional state. Experimental results including cross-database evaluation on the AffectNet, Aff-Wild, and AFEW dataset shows that our approach predicts emotion categories and valence/arou...
Article
Full-text available
Electronic Health Records (EHRs) are aggregated, combined and analyzed for suitable treatment planning and safe therapeutic procedures of patients. Integrated EHRs facilitate the examination, diagnosis and treatment of diseases. However, the existing EHRs models are centralized. There are several obstacles that limit the proliferation of centralize...
Article
Full-text available
A popular unsupervised learning method, known as clustering, is extensively used in data mining, machine learning and pattern recognition. The procedure involves grouping of single and distinct points in a group in such a way that they are either similar to each other or dissimilar to points of other clusters. Traditional clustering methods are gre...
Article
The most fundamental task of the wireless sensor network (WSN) is to monitor a specified region of interest with sufficient sensor coverage. This task is jeopardized when coverage holes appear after the network's deployment. The emergence of coverage holes is unavoidable for many reasons such as sensor node energy depletion, physical damage, or ext...
Article
Full-text available
The increase in GPS-enabled devices and proliferation of location-based applications have resulted in an abundance of geotagged (spatial) data. As a consequence, numerous applications have emerged that utilize the spatial data to provide different types of location-based services. However, the huge amount of available spatial data presents a challe...
Article
Full-text available
Providing effective sensing coverage of an observation area with reduced set of working nodes for maximum duration of time is an important concern for the development of durable and energy efficient WSN applications. A well-organized network structure can greatly promote such requirements. Motivated by the use of computational geometry in network d...
Article
Wireless Sensor Networks (WSNs) consist of sensor nodes that have limited batteries, and are hard to replace due to their deployment in inaccessible areas. Hence, the goal of any WSN protocol is to implement energy efficient mechanisms that prolong the lifetime of WSNs. The existing face topology in WSNs can lead to high energy consumption due to a...
Article
Full-text available
Social media has gained a lot of popularity and become the main source of information. Recently, immediate popular news or stories, known as trending topics have found social networks, such as Twitter, an attractive platform for its spread. Detection of trending topics from social media is a commonly tackled issue in the data mining community as it...
Article
Full-text available
Optimal performance and improved lifetime are the most desirable design benchmarks for IoT based WSNs and the mechanism for data gathering is a major constituent in uencing these standards. Several researchers have provided signi�cant evidence on the advantage of Mobile Sink (MS) in performing e�ective gathering of relevant data. However, determini...
Article
The ubiquity of geo-positioning technologies stimulates continuous growth in dynamic spatial datasets that fuels the development of location-based services. These services require tracking and querying a large population of moving objects. High workloads of users’ requests, both location updates and queries, need to be processed concurrently. Curre...
Article
Social media bots (automated accounts) attacks are organized crimes that pose potential threats to public opinion, democracy, public health, stock market and other disciplines. While researchers are building many models to detect social media bot accounts, attackers, on the other hand, evolve their bots to evade detection. This everlasting cat and...
Article
Full-text available
Over the past few decades, one of the important advancements in wireless communication is low cost and limited power devices known as wireless sensor networks (WSNs). Sensor nodes are used to transmit data but have limited amount of energy. As the transmission takes place, energy gets depleted. So energy consumption and network lifetime are the maj...
Article
Over the past few decades, one of the important advancements in wireless communication is low cost and limited power devices known as wireless sensor networks (WSNs). Sensor nodes are used to transmit data but have limited amount of energy. As the transmission takes place, energy gets depleted. So energy consumption and network lifetime are the maj...
Article
Full-text available
We proposes an energy-aware distributed scheme GPD (General Phenomena Detection) to detect phenomena in data gathered from mobile sensors. In the proposed algorithm, mobile sensors self-organize themselves into groups and elect group heads based on the location of the phenomena. To better share the extra battery power overhead, group heads and subs...
Article
Full-text available
An efficient discovery algorithm of frequently occurring patterns, called motifs, in a time series would be useful as a tool for summarizing and visualizing big time series databases. In this paper, we propose an efficient approximate algorithm, called DiscMotifs, to discover the K most significant (KMS) motifs from time series. First, the proposed...
Article
Full-text available
We address the problem of emotional state detection from facial expressions. Our proposed approach simultaneously detects faces and predicts both discrete emotion categories and continuous valence/arousal values from raw input images. We train and evaluate our approach on 3 different datasets, compare our approach to other state-of-the-art approach...
Article
The increased popularity of micro-blogging applications together with the widespread of location- aware devices have resulted in the creation of large streams of geo-tagged data. Such data provides a great opportunity for researchers to explore event detection and prediction. In particular, road traffic detection and prediction are of great importa...
Article
The work of wireless sensor networks (WSNs) depends on reliable coverage of the area to be monitored. The problem of coverage holes arises when one or more nodes fail due to energy depletion or harsh physical environments. Furthermore, random deployment of nodes could lead to a high degree of overlapping coverage among the sensor nodes. While there...