Naji Alhusaini

ORCID: 0000-0003-2418-357X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Data Mining Algorithms and Applications
  • Rough Sets and Fuzzy Logic
  • Imbalanced Data Classification Techniques
  • Advanced Image and Video Retrieval Techniques
  • Human Pose and Action Recognition
  • Privacy-Preserving Technologies in Data
  • Sentiment Analysis and Opinion Mining
  • Video Analysis and Summarization
  • Advanced Optical Network Technologies
  • Face and Expression Recognition
  • Advanced Multi-Objective Optimization Algorithms
  • Stock Market Forecasting Methods
  • Data Quality and Management
  • Music and Audio Processing
  • Fire Detection and Safety Systems
  • Internet Traffic Analysis and Secure E-voting
  • Functional Brain Connectivity Studies
  • Simulation and Modeling Applications
  • Advanced Text Analysis Techniques
  • Adversarial Robustness in Machine Learning
  • IoT-based Smart Home Systems
  • Video Surveillance and Tracking Methods
  • Advanced Database Systems and Queries
  • Cloud Computing and Resource Management
  • Advanced MRI Techniques and Applications

Chuzhou University
2022-2024

University of Science and Technology of China
2019-2022

Hefei University of Technology
2019

Among various calamities, conflagrations stand out as one of the most-prevalent and -menacing adversities, posing significant perils to public safety societal progress. Traditional fire-detection systems primarily rely on sensor-based detection techniques, which have inherent limitations in accurately promptly detecting fires, especially complex environments. In recent years, with advancement computer vision technology, video-oriented fire owing their non-contact sensing, adaptability...

10.3390/fire6080315 article EN cc-by Fire 2023-08-14

Convolutional neural networks (CNN) are relational with grid-structures and spatial dependencies for two-dimensional images to exploit location adjacencies, color values, hidden patterns. use sparse connections at high-level sensitivity layered connection complying indiscriminative disciplines local mapping footprints. This fact varies architectural dependencies, insight inputs, number types of layers its fusion derived signatures. research focuses this gap by incorporating GoogLeNet,...

10.3390/s21041139 article EN cc-by Sensors 2021-02-06

The lack of sentiment resources in poor resource languages poses challenges for the analysis which machine learning is involved. Cross-lingual and semi-supervised approaches have been deployed to represent most common ways that can overcome this issue. However, performance existing methods degrades due quality translated resources, data sparseness more specifically, language divergence. An integrated model uses a an ensembled while utilizing available tackle divergence related issues...

10.3390/s20185276 article EN cc-by Sensors 2020-09-15

High-utility itemset mining (HUIM), which is the detection of high-utility itemsets (HUIs) in a transactional database, provides decision maker with greater flexibility to exploit item utilities, such as quantity and profits, extract remarkable efficient database patterns. However, most prevailing empirical articles have focused on HUIs. Nevertheless, many practical situations, low-utility (LUIs) maintain high level significance usage (e.g., security systems represent system vulnerabilities...

10.1109/access.2019.2929082 article EN cc-by IEEE Access 2019-01-01

The classical Isomap is the most common unsupervised nonlinear manifold method and widely being used in visualizations dimension reductions. However, when it applied to real-world datasets, shows shortcomings for shortest path between all pairs of data points, which are based on nearest neighborhood G graph via Dijkstra algorithm, makes a very time-consuming step. other critical problem has lack topological stability graph. In this paper, we propose novel technique called FastIsomapVis above...

10.1109/access.2020.3017954 article EN cc-by IEEE Access 2020-01-01

Federated Learning (FL) is a novel framework of decentralized machine learning. Due to the feature FL, it vulnerable adversarial attacks in training procedure, e.g. , backdoor attacks. A attack aims inject into learning model such that will make arbitrarily incorrect behavior on test sample with some specific trigger. Even though range methods FL has been introduced, there are also defending against them. Many utilize abnormal characteristics models or difference between and regular models....

10.48550/arxiv.2208.06176 preprint EN other-oa arXiv (Cornell University) 2022-01-01

Allocating bandwidth guarantees to applications in the cloud has become increasingly demanding and essential as compete share network resources. However, cloud-computing providers offer no a environment, predictably preventing tenants from running their applications. Existing schemes practical cluster abstraction solutions emulating underlying physical resources, proving impractical; however, providing virtual abstractions remained an step right direction. In this paper, we consider...

10.3390/electronics8030258 article EN Electronics 2019-02-26

A number of studies and methods have been proposed to obtain more efficient patterns that meet the requirements decision makers by considering frequency utility thresholds, for example, frequent high rare patterns. However, need know lead minimal benefits appear frequently understand reasons low interest rates, as their may be a factor in increasing rates. Therefore, this paper we propose new framework extracting model is important many cases, named as, inefficient item set (FLUI). In order...

10.1145/3349341.3349464 article EN 2019-07-12

High Utility Itemset Mining (HUIM) is the task of extracting actionable patterns considering utility items such as profits and quantities. An important issue with traditional HUIM methods that they evaluate all using a single threshold, which inconsistent reality due to differences in nature importance items. Recently, algorithms were proposed address this problem by assigning minimum item threshold each item. However, since (MIU) expressed percentage external utility, these still face two...

10.1109/icdmw58026.2022.00071 article EN 2022 IEEE International Conference on Data Mining Workshops (ICDMW) 2022-11-01

Abstract High Utility Itemset Mining (HUIM) alludes to the identification of itemsets high utility in value-based database UP-Growth algorithm is a standout amongst best algorithms for overcome challenge candidate generation and scan reputedly previous algorithms. However, it needs twice actualize UP tree. Regarding updating existing data with new information, UP-growth twofold scanning information information. The fundamental motivation behind this work build up another algorithm,...

10.1088/1742-6596/1284/1/012032 article EN Journal of Physics Conference Series 2019-08-01

Nonlinear Dimensionality Reduction (NLDR) is a well-known approach of manifold learning to transform the data from high low dimensional space. After studying various techniques proposed for NLDR, we find that performance improvement still required. Therefore, adopt classical Isomap, which faces Shortest Path Distance (SPD) and computational time cost problems. These problems are occurring due Dijkstra algorithm. This paper presents A*FastIsomap method SPD issues, based on A* Search Algorithm...

10.1109/icaibd55127.2022.9820063 article EN 2022-05-27

Despite the success of current High Utility Itemset Mining (HUIM) methods in calculating utility items using internal and external utility, effect cost an item's is unknown. Thus, this paper proposes a novel method for HUIM that considers item cost, named Actual High-Utility (AHUIM), to extract new patterns called Itemsets (AHUIs). In proposed method, calculated its cost. However, challenge different may not have same impact on whether threshold satisfied or not. Hence, single inappropriate....

10.2139/ssrn.4285466 article EN 2022-01-01
Coming Soon ...