Search Results - "Ghamdi, Mohammed A Al"

Refine Results
  1. 1

    Brain Tumor Analysis Empowered with Deep Learning: A Review, Taxonomy, and Future Challenges by Nadeem, Muhammad Waqas, Ghamdi, Mohammed A Al, Hussain, Muzammil, Khan, Muhammad Adnan, Khan, Khalid Masood, Almotiri, Sultan H, Butt, Suhail Ashfaq

    Published in Brain sciences (22-02-2020)
    “…Deep Learning (DL) algorithms enabled computational models consist of multiple processing layers that represent data with multiple levels of abstraction. In…”
    Get full text
    Journal Article
  2. 2

    An Optimized and Secure Energy-Efficient Blockchain-Based Framework in IoT by Al Ghamdi, Mohammed A.

    Published in IEEE access (01-01-2022)
    “…With the rapid development of the IoT (Internet-of-Things), additional smart gadgets may be associated with the Internet, significantly enhancing data transfer…”
    Get full text
    Journal Article
  3. 3

    Healthcare Techniques Through Deep Learning: Issues, Challenges and Opportunities by Nisar, Dur-E-Maknoon, Amin, Rashid, Shah, Noor-Ul-Huda, Ghamdi, Mohammed A. Al, Almotiri, Sultan H., Alruily, Meshrif

    Published in IEEE access (2021)
    “…In artificial intelligence, deep learning (DL) is a process that replicates the working mechanism of the human brain in data processing, and it also creates…”
    Get full text
    Journal Article
  4. 4

    Next-generation UWB antennas gadgets for human health care using SAR by Ali, Aysha Maryam, Al Ghamdi, Mohammed A., Iqbal, Muhammad Munwar, Khalid, Shehzad, Aldabbas, Hamza, Saeed, Saqib

    “…The body area network is now the most challenging and most popular network for study and research. Communication about the body has undoubtedly taken its place…”
    Get full text
    Journal Article
  5. 5

    Hybrid GA-SVM Approach for Postoperative Life Expectancy Prediction in Lung Cancer Patients by Nagra, Arfan Ali, Mubarik, Iqra, Asif, Muhammad Mugees, Masood, Khalid, Ghamdi, Mohammed A. Al, Almotiri, Sultan H.

    Published in Applied sciences (01-11-2022)
    “…Medical outcomes must be tracked in order to enhance quality initiatives, healthcare management, and mass education. Thoracic surgery data have been acquired…”
    Get full text
    Journal Article
  6. 6
  7. 7

    A Fine-grained System Driven of Attacks over Several New Representation Techniques using Machine Learning by Al Ghamdi, Mohammed A.

    Published in IEEE access (01-01-2023)
    “…Machine Learning (ML) techniques, especially deep learning, are crucial to many contemporary real world systems that use Computational Intelligence (CI) as…”
    Get full text
    Journal Article
  8. 8

    Integration of D2D, Network Slicing, and MEC in 5G Cellular Networks: Survey and Challenges by Nadeem, Lubna, Azam, Muhammad Awais, Amin, Yasar, Al-Ghamdi, Mohammed A., Chai, Kok Keong, Khan, Muhammad Faisal Nadeem, Khan, Muhammad Adnan

    Published in IEEE access (2021)
    “…With the tremendous demand for connectivity anywhere and anytime, existing network architectures should be modified. To cope with the challenges that arise due…”
    Get full text
    Journal Article
  9. 9

    Analyze textual data: deep neural network for adversarial inversion attack in wireless networks by Al Ghamdi, Mohammed A.

    Published in SN applied sciences (01-12-2023)
    “…Deep neural networks (DNN) are highly effective in a number of tasks related to machine learning across different domains. It is quite challenging to apply the…”
    Get full text
    Journal Article
  10. 10
  11. 11

    Human Pose Estimation Using Deep Learning: A Systematic Literature Review by Samkari, Esraa, Arif, Muhammad, Alghamdi, Manal, Al Ghamdi, Mohammed A.

    Published in Machine learning and knowledge extraction (01-12-2023)
    “…Human Pose Estimation (HPE) is the task that aims to predict the location of human joints from images and videos. This task is used in many applications, such…”
    Get full text
    Journal Article
  12. 12

    DNA Strands Level Scrambling Based Color Image Encryption Scheme by Iqbal, Nadeem, Hanif, Muhammad, Abbas, Sagheer, Khan, Muhammad Adnan, Almotiri, Sultan H., Al Ghamdi, Mohammed A.

    Published in IEEE access (2020)
    “…In the past, many image encryption schemes have been developed through the swapping operations at the different levels of granularity. These levels span bits,…”
    Get full text
    Journal Article
  13. 13

    SAA-UNet: Spatial Attention and Attention Gate UNet for COVID-19 Pneumonia Segmentation from Computed Tomography by Alshomrani, Shroog, Arif, Muhammad, Al Ghamdi, Mohammed A

    Published in Diagnostics (Basel) (08-05-2023)
    “…The disaster of the COVID-19 pandemic has claimed numerous lives and wreaked havoc on the entire world due to its transmissible nature. One of the…”
    Get full text
    Journal Article
  14. 14

    A Proposed Maneuver to Guide Transseptal Puncture Using Real-Time Three-Dimensional Transesophageal Echocardiography: Pilot Study by Anwar, Ashraf M., Ghabashi, Abdullah E., Al-Ghamdi, Mohammed A., Mahmoud, Hani M.

    Published in Cardiology research and practice (01-01-2015)
    “…Aim of Study. To assess the feasibility of a new proposed maneuver “RATLe-90” using real-time three-dimensional transesophageal echocardiography (RT-3DTEE) for…”
    Get full text
    Journal Article
  15. 15

    Deepfake forensics: a survey of digital forensic methods for multimodal deepfake identification on social media by Qureshi, Shavez Mushtaq, Saeed, Atif, Almotiri, Sultan H, Ahmad, Farooq, Al Ghamdi, Mohammed A

    Published in PeerJ. Computer science (27-05-2024)
    “…The rapid advancement of deepfake technology poses an escalating threat of misinformation and fraud enabled by manipulated media. Despite the risks, a…”
    Get full text
    Journal Article
  16. 16

    Adversarial Robustness of Vision Transformers Versus Convolutional Neural Networks by Ali, Kazim, Bhatti, Muhammad Shahid, Saeed, Atif, Athar, Atifa, Al Ghamdi, Mohammed A., Almotiri, Sultan H., Akram, Samina

    Published in IEEE access (2024)
    “…Vision Transformers (ViTs) have proved to be a more powerful substitute for Convolutional Neural Networks (CNNs) in various computer vision tasks, using the…”
    Get full text
    Journal Article
  17. 17

    A Scalable and Efficient Multi-Agent Architecture for Malware Protection in Data Sharing Over Mobile Cloud by Qaisar, Zahid Hussain, Almotiri, Sultan H., Al Ghamdi, Mohammed A., Nagra, Arfan Ali, Ali, Ghulam

    Published in IEEE access (2021)
    “…Sensitive Data requires encryption before uploading to a public cloud. Access control based on Attribute-Based Encryption (ABE) is an effective technique to…”
    Get full text
    Journal Article
  18. 18
  19. 19
  20. 20