scispace - formally typeset
Search or ask a question
Author

Abdulfattah Noorwali

Bio: Abdulfattah Noorwali is an academic researcher from Umm al-Qura University. The author has contributed to research in topics: Computer science & Synchronization (computer science). The author has an hindex of 3, co-authored 23 publications receiving 41 citations.

Papers
More filters
Journal ArticleDOI
12 Mar 2021-PeerJ
TL;DR: In this paper, a novel approach named BCD-WERT is proposed that utilizes the Extremely Randomized Tree and Whale Optimization Algorithm (WOA) for efficient feature selection and classification.
Abstract: Breast cancer is one of the leading causes of death in the current age. It often results in subpar living conditions for a patient as they have to go through expensive and painful treatments to fight this cancer. One in eight women all over the world is affected by this disease. Almost half a million women annually do not survive this fight and die from this disease. Machine learning algorithms have proven to outperform all existing solutions for the prediction of breast cancer using models built on the previously available data. In this paper, a novel approach named BCD-WERT is proposed that utilizes the Extremely Randomized Tree and Whale Optimization Algorithm (WOA) for efficient feature selection and classification. WOA reduces the dimensionality of the dataset and extracts the relevant features for accurate classification. Experimental results on state-of-the-art comprehensive dataset demonstrated improved performance in comparison with eight other machine learning algorithms: Support Vector Machine (SVM), Random Forest, Kernel Support Vector Machine, Decision Tree, Logistic Regression, Stochastic Gradient Descent, Gaussian Naive Bayes and k-Nearest Neighbor. BCD-WERT outperformed all with the highest accuracy rate of 99.30% followed by SVM achieving 98.60% accuracy. Experimental results also reveal the effectiveness of feature selection techniques in improving prediction accuracy.

56 citations

Journal ArticleDOI
TL;DR: A comprehensive review of mainstream consensus protocols such as Delegated Proof of Stake (DPoS), Proof of Activity (PoA) and Proof of Work (PoW) is presented in this article.
Abstract: As Blockchain innovation picks up popularity in many areas, it is frequently hailed as a sound innovation. Because of the decentralization and encryption, many imagine that data put away in a Blockchain is and will consistently be protected. Among various abstraction layers of Blockchain architecture, the consensus layer is the core component behind the performance and security measures of the Blockchain network. Consensus mechanisms are a critical component of a Blockchain system’s long-term stability. Consensus forms the core of blockchain technology. Therefore, a range of consensus protocols has been introduced to maximize Blockchain systems’ efficiency and meet application domains’ individual needs. This research paper describes the layered architecture of Blockchain. A comprehensive review of mainstream consensus protocols mainly Proof of Work (PoW), Proof of Stake (PoS), Delegated Proof of Stake (DPoS), Proof of Activity (PoA) is presented in the paper. These mainstream consensus protocols have been explained and detailed performance analysis of these consensus protocols has been done. We have proposed a performance matrix of these consensus protocols based on different parameters like Degree of decentralization, Latency, Fault Tolerance Rate, Scalability, etc. Consensus protocols being the core of a strong fault-tolerant secured blockchain system, the proposed work intends to help inappropriate protocol selection and further research on strengthening trust and ownership in the technology. Depending upon different parameters like decentralization which is low in POA compared to other protocols, whereas POW is non-scalable, so depending on the priority of a particular performance parameter, the paper will help in the selection of a specific protocol.

49 citations

Journal ArticleDOI
TL;DR: In this paper, a whale optimization-based neural synchronization has been proposed for the development of the key exchange protocol at the time of exchange of sensitive information, intruders can effortlessly perform sniffing, spoofing, phishing, or Man-In-The-Middle (MITM) attack to tamper the vital information information needs to be secretly transmitted with high level of encryption by preserving the authentication, confidentiality, and integrity factors.
Abstract: In this article, a whale optimization-based neural synchronization has been proposed for the development of the key exchange protocol At the time of exchange of sensitive information, intruders can effortlessly perform sniffing, spoofing, phishing, or Man-In-The-Middle (MITM) attack to tamper the vital information Information needs to be secretly transmitted with high level of encryption by preserving the authentication, confidentiality, and integrity factors Such stated requirements urge the researchers to develop a neural network-based fast and robust security protocol A special neural network structure called Double Layer Tree Parity Machine (DLTPM) is proposed for neural synchronization Two DLTPMs accept the common input and different weight vectors and update the weights using neural learning rules by exchanging their output In some steps, it results in complete synchronization, and the weights of the two DLTMs become identical These identical weights serve as a secret key There is, however, hardly any research in the field of neural weight vector optimization using a nature-inspired algorithm for faster neural synchronization In this article, whale optimization-based DLTPM is proposed For faster synchronization, this proposed DLTPM model uses a whale algorithm optimized weight vector This proposed DLTPM model is faster and has better security This proposed technique has been passed through a series of parametric tests The results have been compared with some recent techniques The results of the proposed technique have shown effective and has robust potential

31 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The main aim of the work is to propose a Machine learning-based healthcare model to early and accurately predict the different diseases and help doctors to diagnose the disease early.
Abstract: Artificial Intelligence (AI) is widely implemented in healthcare 4.0 for producing early and accurate results. The early predictions of disease help doctors to make early decisions to save the life of patients. Internet of things (IoT) is working as a catalyst to enhance the power of AI applications in healthcare. The patients' data are captured by IoT_sensor and analysis of the patient data is performed by machine learning techniques. The main aim of the work is to propose a Machine learning-based healthcare model to early and accurately predict the different diseases. In this work, seven machine learning classification algorithms such as decision tree, support vector machine, Naive Bayes, adaptive boosting, Random Forest (RF), artificial neural network, and K-nearest neighbor are used to predict the nine fatal diseases such as heart disease, diabetics breast cancer, hepatitis, liver disorder, dermatology, surgery data, thyroid, and spect heart. To evaluate the performance of the proposed model, four performance metrics (such as accuracy, sensitivity, specificity, and area under the curve) are used. The RF classifier observes the maximum accuracy of 97.62%, the sensitivity of 99.67%, specificity of 97.81%, and AUC of 99.32% for different diseases. The developed healthcare model will help doctors to diagnose the disease early.

81 citations

Journal ArticleDOI
TL;DR: Numerical result shows the significant improvement in latency by the proposed Smart Ant Colony Optimization (SACO) algorithm in task offloading of IoT-sensor applications comparison to Round Robin (RR), throttled, and MPSO and BLA.
Abstract: In the current scenario, Cloud computing is providing services to IoT-sensor based applications in task offloading. In time-sensitive real-time applications, latency is a major problem in cloud computing. Due to exponential growth in IoT-sensor applications huge amount of multimedia data is produced and only the use of cloud computing decreases the efficiency of quality of service (QoS) in IoT-sensor applications. Fog computing uses to resolve the aforementioned issues in cloud computing. Fog computing accomplishes the low-latency requirement of QoS in time-sensitive real-time IoT-sensor applications. Thus the tasks of IoT-sensor applications are computed by various fog nodes. In this paper, a meta-heuristic scheduler Smart Ant Colony Optimization (SACO) task offloading algorithm inspired by nature is proposed to offload the IoT-sensor applications tasks in a fog environment. The proposed algorithm results are compared with Round Robin (RR), throttled scheduler algorithm and two bio-inspired algorithms such as modified particle swarm optimization (MPSO) and Bee life algorithm (BLA). Numerical result shows the significant improvement in latency by the proposed Smart Ant Colony Optimization (SACO) algorithm in task offloading of IoT-sensor applications comparison to Round Robin (RR), throttled, and MPSO and BLA. Proposed technique reduces the task offloading time by 12.88, 6.98, 5.91 and 3.53% in comparison to Round Robin (RR), throttled, MPSO, and BLA.

61 citations

Journal ArticleDOI
TL;DR: A modified network of YOLOv5 is used in this study to detect and classify breast tumors, and the suggested model successfully identifies and classifies breast tumors while also overcoming previous research limitations by lowering the FPR and FNR and boosting the MCC value.
Abstract: Breast cancer incidence has been rising steadily during the past few decades. It is the second leading cause of death in women. If it is diagnosed early, there is a good possibility of recovery. Mammography is proven to be an excellent screening technique for breast tumor diagnosis, but its detection and classification in mammograms remain a significant challenge. Previous studies' major limitation is an increase in false positive ratio (FPR) and false negative ratio (FNR), as well as a drop in Matthews correlation coefficient (MCC) value. A model that can lower FPR and FNR while increasing MCC value is required. To overcome prior research limitations, a modified network of YOLOv5 is used in this study to detect and classify breast tumors. Our research is conducted using publicly available datasets Curated Breast Imaging Subset of DDSM (CBIS-DDSM). The first step is to perform preprocessing, which includes image enhancing techniques and the removal of pectoral muscles and labels. The dataset is then annotated, augmented, and divided into 60% for training, 30% for validation, and 10% for testing. The experiment is then performed using a batch size of 8, a learning rate of 0.01, a momentum of 0.843, and an epoch value of 300. To evaluate the performance of our proposed model, our proposed model is compared with YOLOv3 and faster RCNN. The results show that our proposed model performs better than YOLOv3 and faster RCNN with 96% mAP, 93.50% MCC value, 96.50% accuracy, 0.04 FPR, and 0.03 FNR value. The results show that our suggested model successfully identifies and classifies breast tumors while also overcoming previous research limitations by lowering the FPR and FNR and boosting the MCC value.

55 citations

Journal ArticleDOI
TL;DR: An evolutionary approach for classifying and detecting breast cancer that is based on machine learning and image processing that is advantageous for accurately identifying breast cancer disease using image analysis is discussed.
Abstract: Breast cancer is the most lethal type of cancer for all women worldwide. At the moment, there are no effective techniques for preventing or curing breast cancer, as the source of the disease is unclear. Early diagnosis is a highly successful means of detecting and managing breast cancer, and early identification may result in a greater likelihood of complete recovery. Mammography is the most effective method of detecting breast cancer early. Additionally, this instrument enables the detection of additional illnesses and may provide information about the nature of cancer, such as benign, malignant, or normal. This article discusses an evolutionary approach for classifying and detecting breast cancer that is based on machine learning and image processing. This model combines image preprocessing, feature extraction, feature selection, and machine learning techniques to aid in the classification and identification of skin diseases. To enhance the image’s quality, a geometric mean filter is used. AlexNet is used for extracting features. Feature selection is performed using the relief algorithm. For disease categorization and detection, the model makes use of the machine learning techniques such as least square support vector machine, KNN, random forest, and Naïve Bayes. The experimental investigation makes use of MIAS data collection. This proposed technology is advantageous for accurately identifying breast cancer disease using image analysis.

52 citations

DOI
25 Nov 2021
TL;DR: In this paper, the authors present UAV classification, control applications, and future directions in industry and research interest, as well as the challenges for UAVs, including battery charging, collision avoidance, and security.
Abstract: Recently, unmanned aerial vehicles (UAVs), also known as drones, have gained widespread interest in civilian and military applications, which has led to the development of novel UAVs that can perform various operations. UAVs are aircraft that can fly without the need of a human pilot onboard, meaning they can fly either autonomously or be remotely piloted. They can be equipped with multiple sensors, including cameras, inertial measurement units (IMUs), LiDAR, and GPS, to collect and transmit data in real time. Due to the demand for UAVs in various applications such as precision agriculture, search and rescue, wireless communications, and surveillance, several types of UAVs have been invented with different specifications for their size, weight, range and endurance, engine type, and configuration. Because of this variety, the design process and analysis are based on the type of UAV, with the availability of several control techniques that could be used to improve the flight of the UAV in order to avoid obstacles and potential collisions, as well as find the shortest path to save the battery life with the support of optimization techniques. However, UAVs face several challenges in order to fly smoothly, including collision avoidance, battery life, and intruders. This review paper presents UAVs’ classification, control applications, and future directions in industry and research interest. For the design process, fabrication, and analysis, various control approaches are discussed in detail. Furthermore, the challenges for UAVs, including battery charging, collision avoidance, and security, are also presented and discussed.

37 citations