Skip to main content

previous disabled Page of 4
and
  1. No Access

    Article

    Personal assistant robot using reinforcement learning: DARWIN-OP2 as a case study

    The use of robots as personal assistants has gained significant interest in recent years. In this research, our motivation is to employ a robot as a personal assistant to optimize the office ergonomics for stu...

    Khalil M. Ahmad Yousef, Bassam J. Mohd, Omar Barham in Intelligent Service Robotics (2024)

  2. No Access

    Article

    A robust classification approach to enhance clinic identification from Arabic health text

    Text classification has critical applications, including healthcare, where it can assist patients in locating specialized clinics based on their symptom descriptions. This can enhance healthcare services by re...

    Shrouq Al-Fuqaha’a, Nailah Al-Madi, Bassam Hammo in Neural Computing and Applications (2024)

  3. No Access

    Chapter and Conference Paper

    Information Technology Adoption in Legislative Work: The Lebanese Parliament Model

    This chapter explores the adoption of information technology (IT) in legislative work, specifically in the Lebanese Parliament. With the increasing use of IT in various fields, the legislative sector cannot be...

    Basima Issa, Antoine Saroufim, Bassam Hussein in Intelligent Sustainable Systems (2024)

  4. No Access

    Chapter and Conference Paper

    Digital Transformation of University Course Filing Using Information and Communication Technologies (ICT): A Sustainable Approach

    The focus on stakeholders’ satisfaction is the most crucial element in digital transformation. Applying the culture, practices, processes and technologies of the internet era to respond to expectations and bri...

    Haydar Moussalem, Mohamad Hajj-Hassan, Ali Hage-Diab in Intelligent Sustainable Systems (2024)

  5. No Access

    Chapter

    The Right to Digital Oblivion, with Special Reference to Iraqi Law

    The right to digital oblivion is one of the rights that have emerged with the advent and spread of the Internet. Its recognition has been a matter of controversy in jurisprudence and the judiciary. In terms of...

    Khalid Alzubaidi, Bassam Abu Irmilah, Mahfuz in Intelligent Systems, Business, and Innovat… (2024)

  6. No Access

    Article

    Prevalence of impacted and fuzzy teeth texture in Riyadh region: a retrospective digital radiographic study

    To determine the prevalence of various teeth in the Riyadh population, as well as the angulation, level, and position of mandibular third molar teeth impaction. This retrospective cross-sectional study was car...

    Lingam Amara Swapna, Pradeep Koppolu, Hashim Salah H. Al Ali in Soft Computing (2023)

  7. No Access

    Chapter

    Type-2 Fuzzy Relations: An Approach towards Representing Uncertainty in Associative Medical Relationships

    The acquisition of precise values such as symptoms, signs, laboratory test results, and diseases/diagnoses for expressing meaningful associative relationships between medical entities has always been regarded ...

    Bassam Haddad, Klaus-Peter Adlassnig in Deep Learning and Other Soft Computing Techniques (2023)

  8. Article

    Class balancing framework for credit card fraud detection based on clustering and similarity-based selection (SBS)

    Credit card fraud is a growing problem nowadays and it has escalated during COVID-19 due to the authorities in many countries requiring people to use cashless transactions. Every year, billions of Euros are lo...

    Hadeel Ahmad, Bassam Kasasbeh in International Journal of Information Techn… (2023)

  9. No Access

    Chapter

    The Impact of Artificial Intelligence on Healthcare Area—A Systematic Review

    Artificial intelligence (AI) in the healthcare area is given a lot of attention by researchers and health professionals. AI is transforming medical practice gradually, which has revolutionized the field of hea...

    Zaid Alyabroodi, Sara Abuasal in Artificial Intelligence, Internet of Thing… (2023)

  10. No Access

    Chapter and Conference Paper

    A Framework for Hazard Identification of a Collaborative Plug&Produce System

    Plug&Produce systems accept reconfiguration and have the attribute of physical and logical flexibility. To implement the Plug&Produce system in a manufacturing plant, there is a need to assure that the system ...

    Bassam Massouh, Sudha Ramasamy, Bo Svensson in Intelligent Technologies and Applications (2022)

  11. No Access

    Article

    A deep learning approach for automatic speech recognition of The Holy Qur’ān recitations

    Being the main spiritual source and reference for Muslims, The Holy Qur’ān can be recited in ten recitations (Qiraat). Each recitation (Qiraah) possesses certain features and characteristics that can be discri...

    Imad K. Tantawi, Mohammad A. M. Abushariah in International Journal of Speech Technology (2021)

  12. No Access

    Article

    Determining the adaptation data saturation of ASR systems for dysarthric speakers

    Automatic speech recognition (ASR) systems are gradually accepted as the assistive technology for the physically impaired individuals such as speakers with dysarthria. Dysarthria is a motor speech impairment, ...

    Bassam Ali Al-Qatab, Mumtaz Begum Mustafa in International Journal of Speech Technology (2021)

  13. No Access

    Chapter and Conference Paper

    Prediction of Diabetes Using Hidden Naïve Bayes: Comparative Study

    Classification techniques performance varies widely with the techniques and the datasets employed. A process performance classifier lies in how accurately it categorizes the item. The technique of classificati...

    Bassam Abdo Al-Hameli, AbdulRahman A. Alsewari in Advances on Smart and Soft Computing (2021)

  14. No Access

    Chapter and Conference Paper

    Where Are We in Semantic Concept Extraction for Spoken Language Understanding?

    Spoken language understanding (SLU) topic has seen a lot of progress these last three years, with the emergence of end-to-end neural approaches. Spoken language understanding refers to natural language process...

    Sahar Ghannay, Antoine Caubrière, Salima Mdhaffar, Gaëlle Laperrière in Speech and Computer (2021)

  15. No Access

    Chapter and Conference Paper

    Reduced 3-D Deep Learning Framework for Hyperspectral Image Classification

    In recent years, machine learning has achieved a breakthrough step due to re-branding of Convolutional Neural Networks (CNNs). Advancement in machine learning algorithms makes it easier to process big and info...

    Noureldin Laban, Bassam Abdellatif in The International Conference on Advanced M… (2020)

  16. No Access

    Chapter and Conference Paper

    Distributed Scheduling in Cellular Assembly for Mass Customization

    Industry 4.0 has many objectives; among them is increasing flexibility in manufacturing, as well as offering mass customization, better quality, and improved productivity. It thus enables companies to cope wit...

    Elie Maalouf, Julien Le Duigou in Product Lifecycle Management Enabling Smar… (2020)

  17. No Access

    Chapter and Conference Paper

    Coordinated Scheduling of Fuel Cell-Electric Vehicles and Solar Power Generation Considering Vehicle to Grid Bidirectional Energy Transfer Mode

    Home-to-Vehicle (H2V) appears as an interesting research area due to its public services that incorporates new technologies and new devices for better life quality. The objective is to study and analyze house ...

    Benslama Sami, Nasri Sihem, Zafar Bassam in Advances in Information and Communication (2020)

  18. No Access

    Chapter

    Multiscale Satellite Image Classification Using Deep Learning Approach

    Image classification has been acquiring special importance in the practical applications of remote sensing. This is done with the extraordinary rise of spatial and spectral resolution of satellite imaging sens...

    Noureldin Laban, Bassam Abdellatif in Machine Learning and Data Mining in Aerosp… (2020)

  19. No Access

    Chapter and Conference Paper

    A Survey of Methods for the Construction of an Intrusion Detection System

    Cybercrimes committed using computer networks lead to billions of dollars lose, the illegal access into computer system, stealing valuable data and destroying organization networks which in turn affect the cyb...

    Abdel Karim Kassem, Shymaa Abo Arkoub in Artificial Intelligence and Applied Mathem… (2020)

  20. No Access

    Article

    A hybrid particle swarm optimization with a variable neighborhood search for the localization enhancement in wireless sensor networks

    Localization accuracy and development costs are key and substantial issues considered when operating and managing a wireless sensor network (WSN). This study presents a modern and high-efficiency algorithm bas...

    Bassam Faiz Gumaida, Juan Luo in Applied Intelligence (2019)

previous disabled Page of 4