Claim Missing Document
Check
Articles

Found 6 Documents
Search

Accurate prediction of chronic diseases using deep learning algorithms Cordova, Ronald S.; Maata, Rolou Lyn R.; Jawarneh, Malik; Alshar'e, Marwan I.; Agustin, Oliver C.
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp570-583

Abstract

In this paper, the researchers studied the effects of different activation functions in hidden layers and how they impact the overfitting or underfitting of the model in the multiclass prediction of chronic diseases. This paper also evaluated the effects of varying the number of layers, and hyperparameters and its impact on the accuracy of the model and its generalization capabilities. It was found that exponential linear unit (ELU) does not have a significant advantage over rectified linear unit (ReLU) when used as an activation function in the hidden layer. Additionally, the performance of softmax function, when used in the output layer, is the same as a classic sigmoid output activation function. In terms of the ability of the model to generalize, the researchers achieved a classification accuracy of 100% when the trained model was used to predict unseen data. Through this research, the researchers should be able to assist medical professionals and practitioners in Oman in the validation and diagnosis of chronic diseases in clinics and hospitals.
Effective crop categorization using wavelet transform based optimized long short-term memory technique Pompapathi, Manasani; Khaleelahmed, Shaik; Jawarneh, Malik; Naved, Mohd; Awasthy, Mohan; Srinivas Kumar, Seepuram; Omarov, Batyrkhan; Raghuvanshi, Abhishek
Bulletin of Electrical Engineering and Informatics Vol 14, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v14i3.7748

Abstract

Effective crop categorization is important for keeping track of how crops grow and how much they produce in the future. Gathering crop data on categories, regions, and space distribution in a timely and accurate way could give a scientifically sound reason for changes to the way crops are organized. Polarimetric synthetic aperture radar dataset provides sufficient information for accurate crop categorization. It is essential to classify crops in order to successfully. This article presents wavelet transform (WT) based optimizedlong short-term memory (LSTM) deep learning (DL) for effective crop categorization. Image denoising is performed by WT. Denoising algorithms for images attempt to find a middle ground between totally removing all of the image’s noise and preserving essential, signal-free components of the picture in their original state. After denoising of images, crop image classification is achieved by LSTM and support vector machine (SVM) algorithm. LSTM has achieved 99.5% accuracy.
Chaotic grey wolf optimization based framework for efficient task scheduling in cloud fog computing J., Shreyas; S. Kharat, Reena; N. Phursule, Rajesh; Bhujanga Rao Madamanchi, Venkata; S. Rakshe, Dhananjay; Gupta, Gaurav; Jawarneh, Malik; F., Sammy; Raghuvanshi, Abhishek
Bulletin of Electrical Engineering and Informatics Vol 14, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v14i3.8098

Abstract

Task scheduling is an essential component of any cloud computing architecture that seeks to cater to the requirements of its users in the most effective manner possible. It is essential in the process of assigning resources to new jobs while simultaneously optimising performance. Effective job scheduling is the only method by which it is possible to achieve the essential goals of any cloud computing architecture, including high performance, high profit, high utilisation, scalability, provision efficiency, and economy. This article gives a framework based on chaotic grey wolf optimization (CGWO) for efficiently scheduling tasks in cloud fog computing. Task scheduling is done with CGWO, ant colony optimization (ACO), and min-max algorithms. CloudSim is used to implement task scheduling algorithms. Makespan time required by CGWO algorithm for 500 tasks is 73.27 seconds. CGWO is taking minimum resources to accomplish the tasks in comparison to ACO and min-max methods. Response time of CGWO is also 3745.2 seconds. CGWO is performing better in terms of Makespan time, response time and resource utilization among the methods used in the experimental work.
Elliptic curve cryptography based light weight technique for information security Alshar’e, Marwan; Alzu’bi, Sharf; Al-Haraizah, Ahed; Alkhazaleh, Hamzah Ali; Jawarneh, Malik; Al Nasar, Mohammad Rustom
Bulletin of Electrical Engineering and Informatics Vol 14, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v14i3.8587

Abstract

Recent breakthroughs in cryptographic technology are being thoroughly scrutinized due to their emphasis on innovative approaches to design, implementation, and attacks. Lightweight cryptography (LWC) is a technological advancement that utilizes a cryptographic algorithm capable of being adjusted to function effectively in various constrained environments. This study provides an in-depth analysis of elliptic curve cryptography (ECC), which is a type of asymmetric cryptographic method known as LWC. This cryptographic approach operates over elliptic curves and has two applications: key exchange and digital signature authentication. Next, we will implement asymmetric cryptographic algorithms and evaluate their efficiency. Elliptic curve elgamal algorithms are implemented for encryption and decryption of data. Elliptic curve Diffie-Hellman key exchange is used for sharing keys. Experimental results have shown that ECC needs small size keys to provide similar security. ECC takes less time in key generation, encryption and decryption of plain text. Time taken by ECC to generate a 2,048 bit long key is 1,653 milliseconds in comparison to 4,258 millisecond taken by Rivest-Shamir-Adleman (RSA) technique.
Design of face recognition based effective automated smart attendance system Bangare, Jyoti L.; Chikmurge, Diptee; Kaliyaperumal, Karthikeyan; Meenakshi, Meenakshi; Bangare, Sunil L.; Kasat, Kishori; Rane, Kantilal Pitambar; Veluri, Ravi Kishore; Omarov, Batyrkhan; Jawarneh, Malik; Raghuvanshi, Abhishek
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i3.pp2020-2030

Abstract

The issue of automatic attendance marking has been successfully resolved in recent years through the utilization of standard biometric approaches. Although this strategy is automated and forward-thinking, its use is hindered by time constraints. Acquiring a thumb impression requires the individual to form a line, which might lead to inconvenience. The innovative visual system utilizes a computer and camera to detect and record students’ attendance based on their facial features. This article presents a face recognition based automatic attendance system. This system includes- image acquisition, image enhancement using histogram equalization, image segmentation by fuzzy C means clustering technique, building classification model using K-nearest neighbour (KNN), support vector machine (SVM) and AdaBoost technique. For experimental work, 500 images of students of a class are selected at random. Accuracy of KNN algorithm in proposed framework is 98.75%. It is higher than the accuracy of SVM (96.25%) and AdaBoost (86.50%). KNN is also performing better on parameters likesensitivity, specificity, precision and F_measure.
A Comparative Study of Convolutional Neural Networks and Vision Transformers for Fruit Classification Jawarneh, Malik; Marwanto, Arief; Syamsuar, Dedy; Kusnandar, Maivi
International Journal of Advances in Artificial Intelligence and Machine Learning Vol. 2 No. 2 (2025): International Journal of Advances in Artificial Intelligence and Machine Learni
Publisher : CV Media Inti Teknologi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58723/ijaaiml.v2i2.435

Abstract

Background of study:  Accurate fruit classification is vital for agricultural automation, yet traditional methods are often subjective and inefficient. Convolutional Neural Networks (CNNs) are effective but struggle with global context in fine-grained tasks. Vision Transformers (ViTs), inspired by NLP models, offer global attention mechanisms that may improve classification in complex scenarios.Aims and scope of paper: This study compares the performance of EfficientNet-B0 (a CNN model) and ViT-B/16 (a Transformer model) on a fruit classification task involving five fruit types. The goal is to evaluate their strengths and weaknesses under controlled experimental conditions using a moderately sized dataset.Methods: A dataset of 10,000 fruit images was preprocessed with standard augmentation techniques and split into training and validation sets. Both models were fine-tuned using pretrained weights. Performance was evaluated using accuracy, precision, recall, F1-score, and confusion matrices.Result: EfficientNet-B0 achieved higher overall accuracy (94%) than ViT-B/16 (92%). The CNN model performed consistently across all classes, particularly excelling in bananas and strawberries. ViT-B/16 showed superior results for strawberries but struggled with apples. Confusion matrices revealed class-specific strengths and weaknesses.Conclusion: EfficientNet-B0 is better suited for general fruit classification due to its balanced performance, while ViT-B/16 excels in capturing fine-grained visual features. A hybrid approach may leverage both models’ strengths for enhanced performance in real-world applications.