Miada Almasre’s research while affiliated with King Abdulaziz University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (17)


Comparison of ML models’ overall performance
Confusion matrix of combined prediction results for all models
Comparison of F1 score across models for each CTAS Level
Descriptive statistics of the data
Overall diagnostic accuracy of models with actual CTAS score

+1

Predicting triage of pediatric patients in the emergency department using machine learning approach
  • Article
  • Full-text available

March 2025

·

40 Reads

International Journal of Emergency Medicine

Manal Ahmed Halwani

·

Ghada Merdad

·

Miada Almasre

·

[...]

·

Mahmoud Talal Mosuily

Background The efficient performance of an Emergency Department (ED) relies heavily on an effective triage system that prioritizes patients based on the severity of their medical conditions. Traditional triage systems, including those using the Canadian Triage and Acuity Scale (CTAS), may involve subjective assessments by healthcare providers, leading to potential inconsistencies and delays in patient care. Objective This study aimed to evaluate six Machine Learning (ML) models K-Nearest Neighbors (KNN), Support Vector Machine (SCM), Decision Tree (DT), Random Forest (RF), Gaussian Naïve Bayes (GNB), and Light GBM (Light Gradient Boosting Machine) for triage prediction in the King Abdulaziz University Hospital using the CTAS framework. Methodology We followed three essential phases: data collection (7125 records of ED patients), data exploration and processing, and the development of machine learning predictive models for ED triage at King Abdulaziz University Hospital. Results and conclusion The overall predictive performance of CTAS was the highest using GNB = 0.984 accuracy. The CTAS-level model performance indicated that SVM, RF, and LGBM achieved the highest performance regarding the consistency of precision and recall values across all CTAS levels.

Download

A Comprehensive Analysis Dashboard for Detecting Similar Saudi Twitter Accounts by Using Stylometric Features

November 2024

·

8 Reads

·

1 Citation

ACM Transactions on Asian and Low-Resource Language Information Processing

Criminals, including terrorists, may use Twitter to communicate and share their ideologies. They often employ multiple accounts for anonymity. While the other accounts hide their identities and use it for different purposes (e.g., communication with unknown criminals), they use one to write tweets revealing their beliefs and spreading evil thoughts (e.g., racism and bullying). Since these multiple accounts will not have the same contents, stakeholders cannot rely on the contents to detect various accounts belonging to the same person. Using stylometric features may help to detect these accounts as they depend on the writing style of a person rather than the content of the words and their meaning. In this paper, we build a model and use stylometric features that differ from the state-of-the-art, such as n-gram for part-of-speech tag, frequency of repeated characters, number of emojis, and more. These features distinguish our approach from existing methods. We evaluated different machine and deep learning classifiers to make comparisons. Our results highlight the effectiveness of our feature set, achieving a remarkable accuracy of 96%. Additionally, our findings indicate that machine learning classifiers exhibit superiority over their deep learning counterparts in the context of this study. Furthermore, we developed a comprehensive dashboard that offers users an in-depth analysis of different Twitter accounts and ranks their similarities. The dashboard serves as a valuable tool for gaining insights into the relationships and similarities among the analyzed Twitter accounts.


Create a Realistic IoT Dataset Using Conditional Generative Adversarial Network

October 2024

·

41 Reads

The increased use of Internet of Things (IoT) devices has led to greater threats to privacy and security. This has created a need for more effective cybersecurity applications. However, the effectiveness of these systems is often limited by the lack of comprehensive and balanced datasets. This research contributes to IoT security by tackling the challenges in dataset generation and providing a valuable resource for IoT security research. Our method involves creating a testbed, building the `Joint Dataset’, and developing an innovative tool. The tool consists of two modules: an Exploratory Data Analysis (EDA) module, and a Generator module. The Generator module uses a Conditional Generative Adversarial Network (CGAN) to address data imbalance and generate high-quality synthetic data that accurately represent real-world network traffic. To showcase the effectiveness of the tool, the proportion of imbalance reduction in the generated dataset was computed and benchmarked to the BOT-IOT dataset. The results demonstrated the robustness of synthetic data generation in creating balanced datasets.


Development and Evaluation of a Custom GPT for the Assessment of Students’ Designs in a Typography Course

January 2024

·

232 Reads

·

15 Citations

The recent advancements in the fields of AI technology, generative AI, and Large Language Models (LLMs) have increased the potential of the deployment of such tools in educational environments, especially in contexts where student assessment fairness, quality, and automation are a priority. This study introduces an AI-enhanced evaluation tool that utilizes OpenAI’s GPT-4 and the recently released custom GPT feature to evaluate the typography designs of 25 students enrolled in the Visual Media diploma offered by King Abdulaziz University. A mixed methods approach is adopted to evaluate the performance of this tool against the rubric-based evaluations offered by two human evaluators, considering both grading and text feedback. The results indicate that there are statistically significant differences between the AI tool’s grading and feedback when compared to that of Evaluator 2; however, none is reported with Evaluator 1. The study presents a qualitative interpretation of the comprehensive feedback by the evaluator and reflects in further research in this area.


IoT Traffic Analyzer Tool with Automated and Holistic Feature Extraction Capability

May 2023

·

176 Reads

·

3 Citations

The Internet of Things (IoT) is an emerging technology that attracted considerable attention in the last decade to become one of the most researched topics in computer science studies. This research aims to develop a benchmark framework for a public multi-task IoT traffic analyzer tool that holistically extracts network traffic features from an IoT device in a smart home environment that researchers in various IoT industries can implement to collect information about IoT network behavior. A custom testbed with four IoT devices is created to collect real-time network traffic data based on seventeen comprehensive scenarios of these devices’ possible interactions. The output data is fed into the IoT traffic analyzer tool for both flow and packet levels analysis to extract all possible features. Such features are ultimately classified into five categories: IoT device type, IoT device behavior, Human interaction type, IoT behavior within the network, and Abnormal behavior. The tool is then evaluated by 20 users considering three variables: usefulness, accuracy of information being extracted, performance and usability. Users in three groups were highly satisfied with the interface and ease of use of the tool, with scores ranging from 90.5% to 93.8% and with an average score between 4.52 and 4.69 with a low standard deviation range, indicating that most of the data revolve around the mean



Story Generation from Images Using Deep Learning

October 2021

·

369 Reads

·

2 Citations

Communications in Computer and Information Science

Recently, the problem of creating descriptive captions for images became a significant one. However, human languages’ expressivity had been among the challenges that hindered researchers from widely experimenting with creating linguistically rich captions for images. That motivated us to utilize advanced deep learning algorithms to generate captions for images. The researchers proposed an AI model utilizing deep learning and natural language processing algorithms, which has two main components, an image-feature extractor, and a story generator. The researchers trained the first component (image-feature extractor) of the model to predict object names in images. The second component (story-generator) was trained on a custom short descriptive sentence which considered short stories. So, the output from the first component (list of words) will be entered into the second component to generate stories on input images. Thus, when testing the model’s performance, a list of names will be entered from the first component so that the second generator arranges them and generates a short story from them. The proposed model developed could generate a short story expressive of an input image as shown by the results of a logical value used on the BLEU scale of 0.59, which further research is planned to improve.


A comparison of Arabic sign language dynamic gesture recognition models

March 2020

·

151 Reads

·

34 Citations

Heliyon

Arabic Sign Language (ArSL) is similar to other sign languages in terms of the way it is gestured and interpreted and used as a medium of communication among the hearing-impaired and the communities in which they live in. Research investigating sensor utilization and natural user interfaces to facilitate ArSL recognition and interpretation, is lacking. Previous research has demonstrated that there is not a single classifier modeling approach that can be suitable for all hand gesture recognition tasks, therefore, this research investigated which combination of algorithms, set with different parameters used with a sensor device, produce higher ArSL recognition accuracy results in a gesture recognition system. This research proposed a dynamic prototype model (DPM) using Kinect as a sensor to recognize certain ArSL gestured dynamic words. The DPM used eleven predictive models of three algorithms (SVM, RF, KNN) based on different parameter settings. Research findings indicated that highest recognition accuracy rates for the dynamic words gestured were achieved by the SVM models, with linear kernel and cost parameter = 0.035.



Table 1 . Observation numbers.
Figure 9. Accuracy for each class during the testing step.
Comparison of Four SVM Classifiers Used with Depth Sensors to Recognize Arabic Sign Language Words

June 2017

·

390 Reads

·

16 Citations

The objective of this research was to recognize the hand gestures of Arabic Sign Language (ArSL) words using two depth sensors. The researchers developed a model to examine 143 signs gestured by 10 users for 5 ArSL words (the dataset). The sensors captured depth images of the upper human body, from which 235 angles (features) were extracted for each joint and between each pair of bones. The dataset was divided into a training set (109 observations) and a testing set (34 observations). The support vector machine (SVM) classifier was set using different parameters on the gestured words’ dataset to produce four SVM models, with linear kernel (SVMLD and SVMLT) and radial kernel (SVMRD and SVMRT) functions. The overall identification accuracy for the corresponding words in the training set for the SVMLD, SVMLT, SVMRD, and SVMRT models was 88.92%, 88.92%, 90.88%, and 90.884%, respectively. The accuracy from the testing set for SVMLD, SVMLT, SVMRD, and SVMRT was 97.059%, 97.059%, 94.118%, and 97.059%, respectively. Therefore, since the two kernels in the models were close in performance, it is far more efficient to use the less complex model (linear kernel) set with a default parameter.


Citations (9)


... Further cleaning involves removing email addresses, numerical digits, extra line breaks, consecutive spaces, and special characters (Bagies et al. 2024). Each cleaned tweet is tokenized using the Facebook BART-base model, breaking text into individual tokens for granular analysis (Vaškevičius and Kapočiūtė-Dzikienė, 2024). ...

Reference:

Bridging perspectives on artificial intelligence: a comparative analysis of hopes and concerns in developed and developing countries
A Comprehensive Analysis Dashboard for Detecting Similar Saudi Twitter Accounts by Using Stylometric Features
  • Citing Article
  • November 2024

ACM Transactions on Asian and Low-Resource Language Information Processing

... Originally designed for text generation (Floridi & Chiriatti, 2020;Kikalishvili, 2023;Strasser, 2024), ChatGPT has since improved in contextual understanding, fluency, and reasoning (OpenAI, 2023;Yu, 2023). The release of GPT-4 in 2023 introduced multi-modal capabilities, while CustomGPT in 2024 allowed users to fine-tune AI responses for specific tasks (Almasre, 2024;OpenAI, 2023). ...

Development and Evaluation of a Custom GPT for the Assessment of Students’ Designs in a Typography Course

... To create our "Joint Dataset" IoT dataset, we utilized the IoT TAHFE tool (Traffic Analyzer Tool with Automated and Holistic Feature Extraction Capability) developed by Subahi and Almasre [22]. This tool automatically extracts network features from a pcap file, generating three CSV files: in-depth server/IoT per-packet analysis.csv, ...

IoT Traffic Analyzer Tool with Automated and Holistic Feature Extraction Capability

... Haritha et al. [170] assessed deep learning methods for captioning but suggested future exploration beyond 2020 techniques. Abrar Alnami et al. [171] aimed to create expressive image-based stories but faced complexity limits. Yulin Zhu et al. [172] generated travel stories from image sequences, though template reliance reduced nuance. ...

Story Generation from Images Using Deep Learning
  • Citing Chapter
  • October 2021

Communications in Computer and Information Science

... The remaining datasets in this category consist of signs for 30, 31, and 38 basic and extra Arabic letters. Interestingly, the highest number of signs is 502 in an isolated words dataset [86,87], as well as the lowest number of signs, five, is found in isolated words datasets [80,81,93]. Tables 9-12 show the type of sign captured in each reviewed dataset. ...

Comparison of Four SVM Classifiers Used with Depth Sensors to Recognize Arabic Sign Language Words

... In [9], the researchers created a model to analyse 1400 hand gestures made by 20 users for 28 ArSL letters, and they utilized the Principle Component Analysis (PCA) algorithm to simplify the enormous dataset by removing redundant, irrelevant, or erroneous data due to noise. The 103 collected data points for each gestured letter were reduced to 36, resulting in a data variance of more than 99%. ...

Recognizing Arabic Sign Language gestures using depth sensors and a KSVM classifier
  • Citing Conference Paper
  • September 2016

... example, Al-Malki, et al. (2015) report on employing SL as a medium for professional development in a practicum course delivered to some university students in Saudi Arabia. ...

A Second Life for KAU Practicum Courses: Computer science undergraduates create virtual Worlds in Second Life

... This has contributed greatly to the emergence of e-training, in light of the suffering of traditional training in general, many constraints and restrictions that limit its effectiveness at the international level and thus does not support the competitive positions of organizations in light of the successive changes locally and globally ( Jad Al Rab, 2009). The shift to adoption of e-training methods and practices in the workplace to provide staff with skills has become an essential component of training in many institutions ( Al-malika, 2015). E-training is an effective input for the development of human resources and the formation of cadres capable of achieving objectives in organizations. ...

Self-Paced E-Training in E-Learning for University Teaching Staff

International Journal of Advanced Corporate Learning (iJAC)