Atta Badii

ORCID: 0000-0002-5130-152X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Context-Aware Activity Recognition Systems
  • Business Process Modeling and Analysis
  • Scientific Computing and Data Management
  • Software System Performance and Reliability
  • Video Analysis and Summarization
  • Video Surveillance and Tracking Methods
  • Network Security and Intrusion Detection
  • Anomaly Detection Techniques and Applications
  • Service-Oriented Architecture and Web Services
  • Image Retrieval and Classification Techniques
  • Advanced Image and Video Retrieval Techniques
  • Semantic Web and Ontologies
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • Online Learning and Analytics
  • Online and Blended Learning
  • Multimedia Communication and Technology
  • Innovative Approaches in Technology and Social Development
  • Advanced Steganography and Watermarking Techniques
  • Smart Cities and Technologies
  • Model-Driven Software Engineering Techniques
  • Music and Audio Processing
  • Data Stream Mining Techniques
  • Manufacturing Process and Optimization
  • Security and Verification in Computing

University of Reading
2014-2024

Universities UK
2019

Multimedia University
2016

Laboratoire Traitement du Signal et de l'Image
2016

Henley College
2008

University of Leeds
2006

Northampton Community College
2003-2004

Northampton College
2004

University of Northampton
1999-2003

Financial technology, or Fintech, represents an emerging industry on the global market. With online transactions rise, use of IT for automation financial services is increasing importance. Fintech enables institutions to deliver customers worldwide a 24/7 basis. Its are often easy access and enable perform in real-time. In fact, advantages such as these make increasingly popular among clients. However, since made up information, ensuring security becomes critical issue. Vulnerabilities...

10.3390/s21051594 article EN cc-by Sensors 2021-02-25

Electronic portfolios (E-portfolios) are crucial means for workplace-based assessment and feedback. Although E-portfolios provide a useful approach to view each learner's progress, so far options personalized feedback potential data about performances at the workplace often remain unexploited. This paper advocates that enhanced with learning analytics, might increase quality efficiency of in professional education. Based on 5-phased iterative design approach, an existing E-portfolio...

10.1007/s11423-016-9496-8 article EN cc-by Educational Technology Research and Development 2016-11-04

Abstract Models are used in both Software Engineering (SE) and Artificial Intelligence (AI). SE models may specify the architecture at different levels of abstraction for addressing concerns various stages software development life-cycle, from early conceptualization design, to verification, implementation, testing evolution. However, AI provide smart capabilities, such as prediction decision-making support. For instance, Machine Learning (ML), which is currently most popular sub-discipline...

10.1007/s10270-021-00967-x article EN cc-by Software & Systems Modeling 2022-01-19

This study evaluates the potential of generative models, trained on historical ERA5 reanalysis data, for simulating windstorms over UK. Four including a standard GAN, WGAN-GP, U-net diffusion model, and diffusion-GAN were assessed based their ability to replicate spatial statistical characteristics windstorms. Different models have distinct strengths limitations. The GAN displayed broader variability limited alignment PCA dimensions. WGAN-GP had more balanced performance but occasionally...

10.48550/arxiv.2501.16110 preprint EN arXiv (Cornell University) 2025-01-27

SQL Injection (SQLi) continues to pose a significant threat the security of web applications, enabling attackers manipulate databases and access sensitive information without authorisation. Although advancements have been made in detection techniques, traditional signature-based methods still struggle identify sophisticated injection attacks that evade predefined patterns. As SQLi evolve, need for more adaptive systems becomes crucial. This paper introduces an innovative approach leverages...

10.48550/arxiv.2502.04786 preprint EN arXiv (Cornell University) 2025-02-07

The key trends in emerging ICT integration choices for cost‐effective, flexible knowledge integration, work‐flow‐embedded evaluation and eCRM‐driven value innovation are examined. Enterprise initiatives can create socio‐technical cultural tensions as well possible straitjacketing of business process architectures thus suppressing responsive re‐engineering causing loss competitive advantage some companies. A framework, C‐assure, is presented optimising impact analysis to support throughout...

10.1108/09576050310467287 article EN Logistics Information Management 2003-03-19

This paper describes the Context Awareness Framework developed for HYDRA Middleware Project. The project aims to develop middleware support intelligent networked embedded system based on a service-oriented architecture, deployable both new and existing networks of distributed wireless wired devices. A well (CAF) is crucial success such systems. Changing requirements dynamic environments are drivers context-aware applications. automatic execution adaptations leads successful effective...

10.1109/centric.2010.29 article EN 2010-08-01

Freezing of Gait (FOG) is a disabling symptom and movement disorder, typically associated with the latter stages Parkinson's disease. In this paper, we propose novel approach for real-time FOG, tremor monitoring fall detection, consisting 3D camera sensor based on Microsoft Kinect architecture. The system capable recognizing freezing episodes in standstill state, tremors incidents, commonly seen disease patients. case an incident, it automatically alerts relatives healthcare providers. was...

10.1109/ner.2015.7146727 article EN 2015-04-01

This survey starts with a general overview of the strategies for stock price change predictions based on market data and in particular Limit Order Book (LOB) data. The main discussion is devoted to systematic analysis, comparison, critical evaluation state-of-the-art studies research area movement LOB Flow are two most valuable information sources available traders markets. Academic researchers actively exploring application different quantitative methods algorithms this type predict...

10.3390/math10081234 article EN cc-by Mathematics 2022-04-09

Enterprise application integration (EAI) technologies provide the means to integrate strategic business solutions within and across component parts of organisational information system infrastructures. The continuing development both digitally integrated models, through various eCommerce eBusiness initiatives, has meant that importance EAI enterprise IS, increased significantly. Noting incurs not only technological but stakeholder‐level commitments, this paper outlines product a sustained...

10.1108/17410390410518790 article EN Journal of Enterprise Information Management 2004-03-15

The notion that learning can be enhanced when a teaching approach matches learner's style has been widely accepted in classroom settings since the latter represents predictor of student's attitude and preferences.As such, traditional 'one-size-fits-all' as may applied to delivery Educational Hypermedia Systems (EHSs) changed with an responds users' needs by exploiting their individual differences.However, establishing implementing reliable approaches for matching modalities styles still...

10.5121/ijcsit.2014.6301 article EN International Journal of Computer Science and Information Technology 2014-06-30

In this paper we propose a moving object detection system based on Graph Cut. Our method relies motion modelling using an optical flow algorithm and classical background subtraction module Mixture of Gaussians. The main contribution in our approach is the fusion two mask models, as well particular cost function used by Cut algorithm. experiments performed CDnet 2014 benchmark showed that has very good results scenarios such Bad Weather or PTZ, but less robust detecting small changes scene.

10.1109/iwssip.2015.7314229 article EN 2015-09-01

This research presents a novel multifunctional platform focusing on the clinical diagnosis of kidneys and their pathology (tumors, stones cysts), using "templates"-based technique. As first step, specialist clinicians train system by accurately annotating abnormalities creating "3-D golden standard models." Then, medical technicians experimentally adjust rules parameters (stored as "templates") for integrated "automatic recognition framework" to achieve results which are closest those...

10.1109/thms.2013.2290011 article EN IEEE Transactions on Human-Machine Systems 2014-01-24

The advancement of e-learning technologies has made it viable for developments in education and technology to be combined order fulfil educational needs worldwide.E-learning consists informal learning approaches emerging support the delivery skills, materials, collaboration knowledge sharing.E-learning is a holistic approach that covers wide range courses, infrastructures provide an effective environment.The Learning Management System (LMS) core entire process along with technology, content,...

10.5121/ijcsit.2014.6306 article EN International Journal of Computer Science and Information Technology 2014-06-30

Software engineering of network-centric Artificial Intelligence (AI) and Internet Things (IoT) enabled Cyber-Physical Systems (CPS) services, involves complex design validation challenges. In this paper, we propose a novel approach, based on the model-driven software paradigm, in particular domain-specific modeling methodology. We focus sub-discipline AI, namely Machine Learning (ML) delegation data analytics ML to IoT edge. This way, may increase service quality ML, for example, its...

10.1109/compsac54236.2022.00140 article EN 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) 2022-06-01

Structured Query Language (SQL) Injection constitutes a most challenging type of cyber-attack on the security databases. SQLI attacks provide opportunities by malicious actors to exploit data, particularly client personal data. To counter these measures need be deployed at all layers, namely application layer, network and database layer; otherwise, remains vulnerable levels. Research studies have demonstrated that lack input validation, incorrect use dynamic SQL, inconsistent error handling...

10.1109/sin56466.2022.9970504 article EN 2022-11-11

Several pixel-based people counting methods have been developed over the years. Among these product of scale-weighted pixel sums and a linear correlation coefficient is popular approach. However most approaches paid little attention to resolving true background instead take all foreground pixels into account. With large crowds moving at varying speeds with presence other objects such as vehicles this approach prone problems. In paper we present method which concentrates on determining...

10.1109/pets-winter.2009.5399531 article EN 2009-12-01
Coming Soon ...