Zobrazeno 1 - 10
of 91
pro vyhledávání: '"Adi Alhudhaif"'
Autor:
Nadia Khan, Muhammad Nauman, Ahmad S. Almadhor, Nadeem Akhtar, Abdullah Alghuried, Adi Alhudhaif
Publikováno v:
IEEE Access, Vol 12, Pp 90299-90316 (2024)
In recent years, Explainable Artificial Intelligence (XAI) has attracted considerable attention from the research community, primarily focusing on elucidating the opaque decision-making processes inherent in complex black-box machine learning systems
Externí odkaz:
https://doaj.org/article/728dfda10c2648d5854b80515fa2c9df
Autor:
Adi Alhudhaif, Kemal Polat
Publikováno v:
PeerJ Computer Science, Vol 10, p e2035 (2024)
Currently, most traffic simulations require residents’ travel plans as input data; however, in real scenarios, it is difficult to obtain real residents’ travel behavior data for various reasons, such as a large amount of data and the protection o
Externí odkaz:
https://doaj.org/article/ab7a33283f93497cbf504adcd1ba3f06
Autor:
Adi Alhudhaif
Publikováno v:
PeerJ Computer Science, Vol 10, p e1862 (2024)
Background Artificial intelligence technologies have great potential in classifying neurodegenerative diseases such as Alzheimer’s and Parkinson’s. These technologies can aid in early diagnosis, enhance classification accuracy, and improve patien
Externí odkaz:
https://doaj.org/article/6868bd7de81642edbc8146e9e089c899
Publikováno v:
Current Research in Food Science, Vol 8, Iss , Pp 100723- (2024)
Fruit and vegetable freshness testing can improve the efficiency of agricultural product management, reduce resource waste and economic losses, and plays a vital role in increasing the added value of fruit and vegetable agricultural products. At pres
Externí odkaz:
https://doaj.org/article/19ef3eb630fa4cb18d5bd0752868d72f
Autor:
Adi Alhudhaif, Kemal Polat
Publikováno v:
PeerJ Computer Science, Vol 9, p e1599 (2023)
Background Alzheimer’s disease (AD) is a disease that manifests itself with a deterioration in all mental activities, daily activities, and behaviors, especially memory, due to the constantly increasing damage to some parts of the brain as people a
Externí odkaz:
https://doaj.org/article/3fda4d168c25430fbf74008b5c50bc52
Autor:
Adi Alhudhaif
Publikováno v:
PeerJ Computer Science, Vol 9, p e1598 (2023)
Background This article aims to determine the coefficients that will reduce the in-class distance and increase the distance between the classes, collecting the data around the cluster centers with meta-heuristic optimization algorithms, thus increasi
Externí odkaz:
https://doaj.org/article/d1ece902da8049818e58acb81772135c
Publikováno v:
IEEE Access, Vol 11, Pp 127817-127836 (2023)
Recently, the rate of data generation has reached unprecedented levels, leading to a huge amount of data volume. In addition, modern-day computing systems generate data in diverse formats, ranging from unstructured to structured and semi-structured.
Externí odkaz:
https://doaj.org/article/cecf2505aa674ef083590c6f2c0d6a99
Publikováno v:
IEEE Access, Vol 10, Pp 117638-117645 (2022)
The diverse Internet-of-things (IoT) applications involve massive machine type communication (mMTC) with large number of communicating nodes. The energy and resource overhead owing to shorter battery lives and limited network resources are the main c
Externí odkaz:
https://doaj.org/article/015c80b2c0354a3a8c0ab33b769da61b
Publikováno v:
IEEE Access, Vol 9, Pp 92864-92880 (2021)
State-of-the-art software technologies have enabled Higher Education Institutions to record and store large amounts of student data. Analyzing this large amount of data can facilitate the decision-making process. Decisions made in higher education in
Externí odkaz:
https://doaj.org/article/05316a4d31164695a2337a196b00dea9
Autor:
Adi Alhudhaif, Musheer Ahmad, Ahmed Alkhayyat, Nestor Tsafack, Alaa Kadhim Farhan, Rafeeq Ahmed
Publikováno v:
IEEE Access, Vol 9, Pp 87686-87696 (2021)
The security strengths of block ciphers greatly rely on the confusion components which have the tendency to transform the data nonlinearly into the perplexed form. This paper proposes to put forward a novel scheme of generating cryptographically stro
Externí odkaz:
https://doaj.org/article/06219d30cb784fd188c5080d40bc31b2