Search Results - "Almotiri, Sultan H"
-
1
Integrated Fuzzy Based Computational Mechanism for the Selection of Effective Malicious Traffic Detection Approach
Published in IEEE access (2021)“…A mechanism to effectively detect malicious traffic in the present context where new cyber criminals and threatening actors are emerging every day, has become…”
Get full text
Journal Article -
2
Brain Tumor Analysis Empowered with Deep Learning: A Review, Taxonomy, and Future Challenges
Published in Brain sciences (22-02-2020)“…Deep Learning (DL) algorithms enabled computational models consist of multiple processing layers that represent data with multiple levels of abstraction. In…”
Get full text
Journal Article -
3
Intelligent Techniques for Detecting Network Attacks: Review and Research Directions
Published in Sensors (Basel, Switzerland) (25-10-2021)“…The significant growth in the use of the Internet and the rapid development of network technologies are associated with an increased risk of network attacks…”
Get full text
Journal Article -
4
A Comparative Systematic Literature Review on Knee Bone Reports from MRI, X-Rays and CT Scans Using Deep Learning and Machine Learning Methodologies
Published in Diagnostics (Basel) (26-07-2020)“…The purpose of this research was to provide a “systematic literature review” of knee bone reports that are obtained by MRI, CT scans, and X-rays by using deep…”
Get full text
Journal Article -
5
DNA Strands Level Scrambling Based Color Image Encryption Scheme
Published in IEEE access (2020)“…In the past, many image encryption schemes have been developed through the swapping operations at the different levels of granularity. These levels span bits,…”
Get full text
Journal Article -
6
Healthcare Techniques Through Deep Learning: Issues, Challenges and Opportunities
Published in IEEE access (2021)“…In artificial intelligence, deep learning (DL) is a process that replicates the working mechanism of the human brain in data processing, and it also creates…”
Get full text
Journal Article -
7
Deepfake forensics: a survey of digital forensic methods for multimodal deepfake identification on social media
Published in PeerJ. Computer science (27-05-2024)“…The rapid advancement of deepfake technology poses an escalating threat of misinformation and fraud enabled by manipulated media. Despite the risks, a…”
Get full text
Journal Article -
8
Adversarial Robustness of Vision Transformers Versus Convolutional Neural Networks
Published in IEEE access (2024)“…Vision Transformers (ViTs) have proved to be a more powerful substitute for Convolutional Neural Networks (CNNs) in various computer vision tasks, using the…”
Get full text
Journal Article -
9
Racial Identity-Aware Facial Expression Recognition Using Deep Convolutional Neural Networks
Published in Applied sciences (01-01-2022)“…Multi-culture facial expression recognition remains challenging due to cross cultural variations in facial expressions representation, caused by facial…”
Get full text
Journal Article -
10
A Scalable and Efficient Multi-Agent Architecture for Malware Protection in Data Sharing Over Mobile Cloud
Published in IEEE access (2021)“…Sensitive Data requires encryption before uploading to a public cloud. Access control based on Attribute-Based Encryption (ABE) is an effective technique to…”
Get full text
Journal Article -
11
Hybrid GA-SVM Approach for Postoperative Life Expectancy Prediction in Lung Cancer Patients
Published in Applied sciences (01-11-2022)“…Medical outcomes must be tracked in order to enhance quality initiatives, healthcare management, and mass education. Thoracic surgery data have been acquired…”
Get full text
Journal Article -
12
A Reliable Framework for Secure Communication and Health Assessment of Soldiers in the Battlefield
Published in SAGE open (01-10-2022)“…Wars against the enemy are mandatory for the integrity of a nation. With the passage of time, the nature of war is being changed, to some extent from a…”
Get full text
Journal Article -
13
A Systematic Review on Monitoring and Advanced Control Strategies in Smart Agriculture
Published in IEEE access (2021)“…Automation in agriculture nowadays is the main focus and area of development for various countries. The population rate of the world is increasing rapidly and…”
Get full text
Journal Article -
14
A fusion of BERT, machine learning and manual approach for fake news detection
Published in Multimedia tools and applications (01-03-2024)“…A large number of users around the globe have preferred to read news and the latest information from the Internet, especially social media, leaving behind the…”
Get full text
Journal Article -
15
Automatic motion tracking of a human in a surveillance video
Published in 2015 IEEE First International Smart Cities Conference (ISC2) (01-10-2015)“…In this paper we describe a method of automatic motion tracking of a person in a sequence of video frames. The method is suitable for tracking a person walking…”
Get full text
Conference Proceeding -
16
Mobile Health (m-Health) System in the Context of IoT
Published in 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) (01-08-2016)“…In this paper we describe the mobile health (m-health) system in the context of Internet of Things (IoT). We describe the fundamental characteristics of…”
Get full text
Conference Proceeding -
17
Design and evaluation of security mechanism for routing in MANETs
Published 01-01-2013“…Ensuring trustworthiness through mobile nodes is a serious issue. Indeed, securing the routing protocols in Mobile Ad Hoc Network (MANET) is of paramount…”
Get full text
Dissertation -
18
Design and evaluation of security mechanism for routing in manets: elliptic curve diffie-hellman cryptography mechanism to secure dynamic source routing protocol (dsr) in mobile ad hoc network (manet)
Published 01-01-2013“…Ensuring trustworthiness through mobile nodes is a serious issue. Indeed, securing the routing protocols in Mobile Ad Hoc Network (MANET) is of paramount…”
Get full text
Dissertation -
19
Integrated Fuzzy Based Computational Mechanism for the Selection of Effective Malicious Traffic Detection Approach
Published in Access, IEEE (2021)“…A mechanism to effectively detect malicious traffic in the present context where new cyber criminals and threatening actors are emerging every day, has become…”
Get full text
Standard