- Smart Agriculture and AI
- Context-Aware Activity Recognition Systems
- IoT and Edge/Fog Computing
- Anomaly Detection Techniques and Applications
- ECG Monitoring and Analysis
- Advanced MIMO Systems Optimization
- Cloud Computing and Resource Management
- Artificial Intelligence in Healthcare
- EEG and Brain-Computer Interfaces
- Metaheuristic Optimization Algorithms Research
- Air Quality Monitoring and Forecasting
- Blockchain Technology Applications and Security
- Spam and Phishing Detection
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Spectroscopy and Chemometric Analyses
- Network Packet Processing and Optimization
- Sentiment Analysis and Opinion Mining
- Sexuality, Behavior, and Technology
- Customer churn and segmentation
- Internet of Things and AI
- Currency Recognition and Detection
- Imbalanced Data Classification Techniques
- Cooperative Communication and Network Coding
- Age of Information Optimization
American University of the Middle East
2018-2025
Due to the increasing global population and growing demand for food worldwide as well changes in weather conditions availability of water, artificial intelligence (AI) such expert systems, natural language processing, speech recognition, machine vision have changed not only quantity but also quality work agricultural sector. Researchers scientists are now moving toward utilization new IoT technologies smart farming help farmers use AI technology development improved seeds, crop protection,...
Machine learning applications are having a great impact on the global economy by transforming data processing method and decision making. Agriculture is one of fields where significant, considering crisis for food supply. This research investigates potential benefits integrating machine algorithms in modern agriculture. The main focus these to help optimize crop production reduce waste through informed decisions regarding planting, watering, harvesting crops. paper includes discussion...
This research investigates the potential benefits of integrating machine learning algorithms and IoT sensors in modern agriculture. The focus is on optimizing crop production reducing waste through informed decisions about planting, watering, harvesting crops. paper discusses current state agriculture, highlighting key challenges opportunities. It also presents experimental results that demonstrate impact changing labels accuracy data analysis algorithms. findings recommend by analyzing...
The article describes a novel sentiment analysis framework for social media platforms, based on combination of five machine learning (ML) algorithms—Multinomial Naive Bayes, Random Forest Classifier, Gradient Boosting K-Nearest Neighbors, and Decision Tree—and three deep (DL) algorithms—LSTM, MLP, CNN. Using comprehensive datasets from Facebook Twitter, the authors achieved remarkable results, with LSTM demonstrating superior performance, achieving an accuracy 0.99, excelling particularly...
Lately, skeleton-based action recognition has drawn remarkable attention to graph convolutional networks (GCNs). Recent methods have focused on learning because topology is the key GCNs. We propose align channel level by introducing convolution with enriched based careful channel-wise correlations, namely attentive correlation (ACC-GC). For model learn topologies, ACC-GC learns a shared spanning many channels and enhances it correlations. Encoding intra-correlation between various nodes...
Abstract This research addresses the accuracy issues in IoT-based human activity recognition (HAR) applications, essential for health monitoring, elderly care, gait analysis, security, and Industry 5.0. study uses 12 machine learning approaches, split equally between support vector (SVM) k-nearest neighbor (k-NN) models. Data from 102 individuals, aged 18–43, were used to train test these The researchers aimed detect twelve daily activities, such as sitting, walking, cycling. Results showed...
This paper introduces a novel hybrid optimization algorithm, PDO-DE, which integrates the Prairie Dog Optimization (PDO) algorithm with Differential Evolution (DE) strategy. research aims to develop an that efficiently addresses complex problems in engineering design and network intrusion detection systems. Our method enhances PDO's search capabilities by incorporating DE's principal mechanisms of mutation crossover, facilitating improved solution exploration exploitation. We evaluate...
<p>In this study, we are proposing a practical way for human identification based on new biometric method. The method is built the use of electrocardiogram (ECG) signal waveform features, which produced from process acquiring electrical activities heart by using electrodes placed body. This launched over period time recording device to read and store ECG signal. On contrary other biometrics like voice, fingerprint iris scan, cannot be copied or manipulated. first operation our system...
Reaching a flat network is the main target of future evolved packet core for 5G mobile networks. The current 4th generation centralized architecture, including Serving Gateway and Packet-data-network Gateway; both act as mobility IP anchors. However, this architecture suffers from non-optimal routing intolerable latency due to many control messages. To overcome these challenges, we propose partially distributed 5th networks, such that plane data are fully decoupled. proposed based on node...
Enhancing the performance of wireless networks and communication systems requires careful resource allocation. Resource allocation optimization, however, is regarded as a mixed-integer non-linear programming (MINLP) problem, which NP-hard non-convex. Due to serious limitations conventional procedures, solving such optimization problems specialized approaches. For instance, no optimal can be guaranteed using heuristic algorithms; besides, global suffer from exponential computation complexity...
In the recent past, Distributed Denial of Service (DDoS) attacks have become more abundant and present one most serious security threats. a DDoS attack, attacker controls botnet daemons residing in vulnerable hosts that send significant amount traffic to flood victim or network infrastructure. this paper, common type known as "TCP SYN-Flood" is studied. This attack uses spoofed Internet Protocol (IP) addresses for SYN packets by exploiting weakness Transmission Control (TCP) 3-Way handshake...
The appearance of fruits is crucial in their quality grading and consumer choices. Colour, texture, size, shape determine fruit quality. Existing computer vision systems have been implemented for external control, relying on observations classification. Banana detection systems, which employ advanced algorithms sensors to evaluate the ripeness general bananas throughout life cycle, are an innovative application smart farming technology. In this proposed system, Knowledge Embedded-Graph...
Wireless sensor networks (WSNs) are important for applications like environmental monitoring and industrial automation. However, the limited energy resources of nodes pose a significant challenge to network’s longevity. Energy imbalances among often result in premature failures reduced overall network lifespan. Current solutions have not adequately addressed this issue due dynamics, varying consumption rates, uneven node distribution. To tackle this, we propose novel method using Prim’s...
The environment prototype of the Internet Things (IoT) has opened horizon for researchers to utilize such environments in deploying useful new techniques and methods different fields areas. deployment process takes place when numerous IoT devices are utilized implementation phase methods. With wide use our daily lives many fields, personal identification is becoming increasingly important society. This survey aims demonstrate various aspects related biometric authentication healthcare...
This paper presents a way of detecting twelve daily physical human activities such as sitting, laying, standing, attaching to table, walking, jogging, running, jumping, pushups, stairs down, going up stairs, and cycling with acceleration gyroscope sensors data resulted from using android smart mobile phones. An application was developed collect raw the sensors. The subjects preformed phones where it is installed. Five samples had been selected train data, while rest ten test data. In order...
Many social media apps provide privacy settings that allow users to control how their data should be processed and shared. Also, every account in these comes with default are often difficult grasp find, even for experts. Therefore, many users' may utilized outside of actual preferences. In this paper, we aim explore match people's real To end, performed a UK-based online survey where asked respondents about preferences some popular like Facebook LinkedIn. The results show the other than...
In botany and agriculture, classifying leaves is a crucial process that yields vital information for studies on biodiversity, ecological studies, the identification of plant species. The Cope Leaf Dataset offers comprehensive collection leaf images from various species, enabling development evaluation advanced classification algorithms. This study presents robust methodology within by enhancing feature extraction selection process. has 99 classes 64 features with 1584 records. Features are...