Sadiq Sani

ORCID: 0000-0001-9784-8398
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Context-Aware Activity Recognition Systems
  • Human Pose and Action Recognition
  • Topic Modeling
  • Natural Language Processing Techniques
  • Anomaly Detection Techniques and Applications
  • Non-Invasive Vital Sign Monitoring
  • Artificial Intelligence in Healthcare
  • Musculoskeletal pain and rehabilitation
  • IoT and Edge/Fog Computing
  • Semantic Web and Ontologies
  • Stroke Rehabilitation and Recovery
  • Advanced Text Analysis Techniques
  • Text and Document Classification Technologies
  • Face and Expression Recognition
  • Time Series Analysis and Forecasting
  • Advanced Malware Detection Techniques
  • Domain Adaptation and Few-Shot Learning
  • Spam and Phishing Detection
  • Metal complexes synthesis and properties
  • Synthesis and biological activity
  • Cardiac Health and Mental Health
  • Advanced Computational Techniques and Applications
  • Network Security and Intrusion Detection
  • Mobile Health and mHealth Applications
  • Fibromyalgia and Chronic Fatigue Syndrome Research

BT Research
2020-2023

Robert Gordon University
2011-2020

Self-management is the key recommendation for managing nonspecific low back pain (LBP). However, there are well-documented barriers to self-management; therefore, methods of facilitating adherence required. Smartphone apps increasingly being used support self-management long-term conditions such as LBP.The aim this study was assess usability and acceptability SELFBACK smartphone app, designed facilitate non-specific LBP. The app provides weekly plans, comprising physical activity, strength...

10.2196/18729 article EN cc-by JMIR Rehabilitation and Assistive Technologies 2020-07-07

We consider the problem of segmenting text documents that have a two-part structure such as part and solution part. Documents this genre include incident reports typically involve description events relating to followed by those pertaining was tried. Segmenting into component two parts would render them usable in knowledge reuse frameworks Case-Based Reasoning. This segmentation presents hard case for traditional due lexical inter-relatedness segments. develop technique can harness corpus...

10.1145/2396761.2396862 article EN 2012-10-29

Clustering is a useful technique that organizes large quantity of unordered datasets into small number meaningful and coherent clusters. Every clustering method based on the index similarity or dissimilarity between data points. However, true intrinsic structure could be correctly described by formula defined embedded in criterion function. This paper uses squared Euclidean distance Manhattan to investigates best for measuring objects sparse high-dimensional domain which fast, capable...

10.4314/bajopas.v12i2.21 article EN Bayero Journal of Pure and Applied Sciences 2021-02-12

Deep learning Machine Network intrusion securityComputer networks form much of the infrastructure supporting day-to-day life in this digital age.Computer networks, however, are prone to attack and therefore require detection systems.Intrusion systems provide a mechanism detect network attacks at an early stage generate alerts.These systems, far from panacea.Rather, they tend overwhelm their operators with alerts, which more than 90% cases can be false positives.As such, problem positives is...

10.1016/j.iswa.2023.200215 article EN cc-by-nc-nd Intelligent Systems with Applications 2023-03-15

The Internet of things is a rapidly expanding paradigm which fundamentally altering the way in we interact with technology. A range new services are enabled by this technological revolution, one task activity recognition from performing classification on sensed information, an area research related to assisted living. ability reliably sense environment crucial aspect application area, has, date, been prone error and poor data quality. Therefore, it essential that able identify potentially...

10.1109/services48979.2020.00016 article EN 2020-10-01
Coming Soon ...