Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2024
CMGNet: Context-aware middle-layer guidance network for salient object detection
Journal of King Saud University - Computer and Information Sciences (JKSUCIS), Volume 36, Issue 1Jan 2024https://doi.org/10.1016/j.jksuci.2023.101838AbstractSalient object detection (SOD) is a critical task in computer vision that involves accurately identifying and segmenting visually significant objects in an image. To address the challenges of gridding issues and feature dilution effects commonly ...
- research-articleApril 2024
An efficient feature selection and explainable classification method for EEG-based epileptic seizure detection
- Ijaz Ahmad,
- Chen Yao,
- Lin Li,
- Yan Chen,
- Zhenzhen Liu,
- Inam Ullah,
- Mohammad Shabaz,
- Xin Wang,
- Kaiyang Huang,
- Guanglin Li,
- Guoru Zhao,
- Oluwarotimi Williams Samuel,
- Shixiong Chen
Journal of Information Security and Applications (JISA), Volume 80, Issue CFeb 2024https://doi.org/10.1016/j.jisa.2023.103654AbstractEpilepsy is a prevalent neurological disorder that poses life-threatening emergencies. Early electroencephalogram (EEG) seizure detection can mitigate the risks and aid in the treatment of patients with epilepsy. EEG based epileptic seizure (ES) ...
- research-articleDecember 2023JUST ACCEPTED
Enhancing Coherence and Diversity in Multi-Class Slogan Generation Systems
ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP), Just Accepted https://doi.org/10.1145/3637551Many problems related to natural language processing are solved by neural networks and big data. Researchers have previously focused on single-task supervised goals with limited data management to train slogan classification. A multi-task learning ...
- research-articleNovember 2023
ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks
- Bakht Sher Ali,
- Inam Ullah,
- Tamara Al Shloul,
- Izhar Ahmed Khan,
- Ijaz Khan,
- Yazeed Yasin Ghadi,
- Akmalbek Abdusalomov,
- Rashid Nasimov,
- Khmaies Ouahada,
- Habib Hamam
The Journal of Supercomputing (JSCO), Volume 80, Issue 6Apr 2024, Pages 7876–7905https://doi.org/10.1007/s11227-023-05764-5AbstractThe growing volume of data, especially in cases of imbalanced datasets, has posed significant challenges in the classification process, particularly when it comes to identifying cyberattacks on industrial control systems (ICS) networks, which have ...
- research-articleOctober 2023
Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features
The Journal of Supercomputing (JSCO), Volume 80, Issue 5Mar 2024, Pages 5870–5899https://doi.org/10.1007/s11227-023-05685-3AbstractThe term "Internet of things (IoT)” refers to a network in which data from all connected devices may be gathered, analyzed, and modified as per requirements to offer new services. IoT devices require a constant Internet connection to exchange ...
-
- research-articleSeptember 2023
Breaking down linguistic complexities: A structured approach to aspect-based sentiment analysis
- Kanwal Ahmed,
- Muhammad Imran Nadeem,
- Zhiyun Zheng,
- Dun Li,
- Inam Ullah,
- Muhammad Assam,
- Yazeed Yasin Ghadi,
- Heba G. Mohamed
Journal of King Saud University - Computer and Information Sciences (JKSUCIS), Volume 35, Issue 8Sep 2023https://doi.org/10.1016/j.jksuci.2023.101651AbstractAspect-based sentiment analysis refers to the task of determining the sentiment polarity associated with particular aspects mentioned in a sentence or document. Previous studies have used attention-based neural network models to connect aspect ...
- ArticleAugust 2023
An Improved UAV Detection Method Based on YOLOv5
Advanced Intelligent Computing Technology and ApplicationsAug 2023, Pages 739–750https://doi.org/10.1007/978-981-99-4755-3_64AbstractBecause unmanned aerial vehicles(UAVs) have the characteristics of low flight trajectory, slow motion speed, and small volume, they are difficult to identify using current vision technologies. To meet the requirements for detection speed and ...
- research-articleAugust 2023
Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices
Physical Communication (PHYCOM), Volume 59, Issue CAug 2023https://doi.org/10.1016/j.phycom.2023.102084AbstractThe Internet of Things (IoT) technologies continuously expand with time due to the advances in automated, connected device technology, mobility, and wide access to information. IoT is the collection of many linked devices due to their ...
- review-articleJuly 2023
Causality extraction: A comprehensive survey and new perspective
Journal of King Saud University - Computer and Information Sciences (JKSUCIS), Volume 35, Issue 7Jul 2023https://doi.org/10.1016/j.jksuci.2023.101593AbstractResearchers in natural language processing are paying more attention to causality mining. Numerous applications of the growing need for efficient and accurate causality mining include question answering, future events predication, discourse ...
- research-articleApril 2023
An ensemble face recognition mechanism based on three-way decisions
Journal of King Saud University - Computer and Information Sciences (JKSUCIS), Volume 35, Issue 4Apr 2023, Pages 196–208https://doi.org/10.1016/j.jksuci.2023.03.016AbstractThe explainable human–computer interaction (HCI) is about designing approaches capable of using cognitive characteristics like humans. One such characteristic is human vision and its accuracy. The accuracy measures the trust in that system. ...
- research-articleJanuary 2023
Analysis of cost and profit using aggregation operators on spherical fuzzy sets with confidence level
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 45, Issue 12023, Pages 675–686https://doi.org/10.3233/JIFS-220102To deal with the ambiguity in real-world problems, researchers strive to obtain extensions to classical set theory. They introduced ideas like fuzzy set theory, spherical, intuitionistic, and Pythagorean fuzzy sets. In comparison to fuzzy sets, spherical ...
- research-articleJanuary 2023
Supervised Machine Learning Based Noninvasive Prediction of Atrial Flutter Mechanism from P-to-P Interval Variability under Imbalanced Dataset Conditions
- Inam Ullah,
- Muhammad Usman Gul,
- Muhammad Haziq Kamarul Azman,
- Kushsairy Abdul Kadir,
- Jawad Ali Shah,
- Seada Hussen
Computational Intelligence and Neuroscience (CIAN), Volume 20232023https://doi.org/10.1155/2023/8162325Atrial flutter (AFL) is a common arrhythmia with two significant mechanisms, namely, focal (FAFL) and macroreentry (MAFL). Discrimination of the AFL mechanism through noninvasive techniques can improve radiofrequency ablation efficacy. This study aims to ...
- research-articleJanuary 2023
A Privacy Protection Framework for Medical Image Security without Key Dependency Based on Visual Cryptography and Trusted Computing
Computational Intelligence and Neuroscience (CIAN), Volume 20232023https://doi.org/10.1155/2023/6758406The development of mobile Internet and the popularization of intelligent sensor devices greatly facilitate the generation and transmission of massive multimedia data including medical images and pathological models on the open network. The popularity of ...
- research-articleJanuary 2023
Machine Learning Techniques for Antimicrobial Resistance Prediction of Pseudomonas Aeruginosa from Whole Genome Sequence Data
- Inam Ullah,
- Sohail M. Noman,
- Muhammad Zeeshan,
- Jehangir Arshad,
- Melkamu Deressa Amentie,
- Muhammad Shafiq,
- Yumeng Yuan,
- Mi Zeng,
- Xin Li,
- Qingdong Xie,
- Xiaoyang Jiao
Computational Intelligence and Neuroscience (CIAN), Volume 20232023https://doi.org/10.1155/2023/5236168Aim. Due to the growing availability of genomic datasets, machine learning models have shown impressive diagnostic potential in identifying emerging and reemerging pathogens. This study aims to use machine learning techniques to develop and compare a ...
- research-articleOctober 2022
A Discriminative Level Set Method with Deep Supervision for Breast Tumor Segmentation
- Sumaira Hussain,
- Xiaoming Xi,
- Inam Ullah,
- Syed Azeem Inam,
- Farah Naz,
- Kashif Shaheed,
- Syed Asif Ali,
- Cuihuan Tian
Computers in Biology and Medicine (CBIM), Volume 149, Issue COct 2022https://doi.org/10.1016/j.compbiomed.2022.105995Abstract Background:Breast tumor segmentation in B-mode ultrasound imaging is important for analyzing, identifying, and diagnosing tumors. The level set is an approach most widely used in breast segmentation, and the refinement is still in progress. ...
Highlights- A novel, deeply supervised network is devised for breast tumor segmentation.
- A discriminative level-set method is integrated at different stages of the network.
- A new feature-discriminator is added to the level set method’s energy ...
- research-articleApril 2022
DS-CNN: A pre-trained Xception model based on depth-wise separable convolutional neural network for finger vein recognition
Expert Systems with Applications: An International Journal (EXWA), Volume 191, Issue CApr 2022https://doi.org/10.1016/j.eswa.2021.116288Highlights- A pre-trained model based on a depth-wise separable convolution layer is employed.
Finger vein recognition received special attention among all other biometric traits due to its high security. Adequate recognition and classification accuracy ensure the security of personal authentication. Many convolutional neural ...
- research-articleJanuary 2022
A Novel Hybrid Deep Learning Model for Metastatic Cancer Detection
- Shibli Nisar,
- Shahab Ahmad,
- Tahir Ullah,
- Ijaz Ahmad,
- Abdulkarem AL-Sharabi,
- Kalim Ullah,
- Rehan Ali Khan,
- Saim Rasheed,
- Inam Ullah,
- Md. Nasir Uddin,
- Md. Sadek Ali
Computational Intelligence and Neuroscience (CIAN), Volume 20222022https://doi.org/10.1155/2022/8141530Cancer has been found as a heterogeneous disease with various subtypes and aims to destroy the body’s normal cells abruptly. As a result, it is essential to detect and prognosis the distinct type of cancer since they may help cancer survivors with ...
- research-articleJanuary 2022
Application of Deep Learning in College Physical Education Design under Flipped Classroom
Computational Intelligence and Neuroscience (CIAN), Volume 20222022https://doi.org/10.1155/2022/7368771With the development of information technology, teaching reform has also undergone major changes. The traditional college physical education teaching method cannot meet the needs of the majority of students, and the physical education teaching mode ...
- research-articleJanuary 2022
Bidirectional CPW Fed Quad-Band DRA for WLAN/WiMAX Applications
- Chunqiang Hu,
- Assad Iqbal,
- Owais Owais,
- Mohammed K. A. Kaabar,
- Mustafa Shakir,
- Inam Ullah,
- Aftab Ahmad Khan,
- Abd Ullah Khan,
- Ateeq Ur Rehman
Wireless Communications & Mobile Computing (WCMC), Volume 20222022https://doi.org/10.1155/2022/3763555Due to the size constraint, antennas with compact size are required that can support multibands with single radiating element. Dielectric resonator antenna (DRA) can support multiple modes with good efficiency and gain using single radiating element. In ...
- research-articleJanuary 2022
An Explainable Statistical Method for Seizure Prediction Using Brain Functional Connectivity from EEG
Computational Intelligence and Neuroscience (CIAN), Volume 20222022https://doi.org/10.1155/2022/2183562Background. Epilepsy is a group of chronic neurological disorders characterized by recurrent and abrupt seizures. The accurate prediction of seizures can reduce the burdens of this disorder. Now, existing studies use brain network features to classify ...