Ghaleb Gaphari | Sana'a University (original) (raw)
Papers by Ghaleb Gaphari
Research Square (Research Square), Mar 11, 2024
The pervasiveness of big data has revolutionized the landscape of information technology (IT), of... more The pervasiveness of big data has revolutionized the landscape of information technology (IT), offering a wealth of insights and opportunities for various sectors, including healthcare, education, and the Internet of Things (IoT). However, the sheer volume and complexity of big data pose challenges in extracting meaningful knowledge. To address this, we propose a novel model for optimal sample selection, enabling e cient extraction of representative subsets from big data. The proposed model, based on optimal jumps, dynamically adapts the clustering process to enhance the e ciency of data sampling. We employ the Adjusted Rand Index (ARI) to evaluate the similarity between clusters and guide the selection of new data in each iteration This model holds the potential to signi cantly enhance the utilization of big data while reducing computational demands. The proposed could run on big datasets and the samples taken represents the dataset.
Lecture notes on data engineering and communications technologies, 2024
Lecture notes on data engineering and communications technologies, 2024
Mağallaẗ ğāmiʿaẗ Ṣanʿāʾ li-l-ʿulūm al-taṭbīqiyyaẗ wa-al-tiknūlūğiyā, Feb 24, 2024
In today's world, social media has become one of the most accessible sources of news for people w... more In today's world, social media has become one of the most accessible sources of news for people worldwide due to its low cost, easy accessibility, and rapid dissemination. However, the harmful effects of fake news on individuals and society have been evident for a long time. Despite the challenges in detecting false information, numerous scholars are working to understand the issue and its characteristics. The purpose of this paper is to analyze contemporary frameworks that make use of different machine learning techniques in order to further our understanding of false news identification. The efficiency of these frameworks in recognizing and halting the spread of false information may be compared by examining various methods. A particular technique was used in the review process to provide a thorough and instructive assessment. Even though a lot of research has been done to identify false news, more can be done in the future. These studies have many limitations such as biased data, adaptability, credibility analysis and the news is only categorized as legitimate or unauthentic by their solutions. Nevertheless, a system of ratings or scores to assess the reliability of news is necessary for a workable approach.
مجلة جامعة صنعاء للعلوم التطبيقية والتكنولوجيا
The field of sentiment analysis of Arabic scripts remains a major challenge due to the features, ... more The field of sentiment analysis of Arabic scripts remains a major challenge due to the features, characteristics, and complexity of the Arabic language. Few studies on Arabic Sentiment Analysis (ASA) have been conducted to the best of our knowledge when compared to English or other Latin languages. In addition, for ASA, very few studies have been conducted regarding the comments of the users (customers) of the apps available on the Google Play Store within various mobile application reviews. Most of the current studies have been conducted on datasets collected from Twitter user comments. In this paper, we propose a new approach to the analysis of sentiment in Arabic script based on the comments dataset of users of some mobile applications available on the Google Play Store. The proposed approach involves improving algorithms such as the Levenshtein distance (LD) algorithm for data preprocessing and then combining it with the K-Nearest Neighbor (K-NN) algorithm. Through the proposed ...
2023 3rd International Conference on Emerging Smart Technologies and Applications (eSmarTA)
2022 2nd International Conference on Emerging Smart Technologies and Applications (eSmarTA)
2022 2nd International Conference on Emerging Smart Technologies and Applications (eSmarTA)
International Journal of Computer Sciences and Engineering
International Journal of Intelligent Networks
Design Engineering, Nov 27, 2021
2021 International Conference on Intelligent Technology, System and Service for Internet of Everything (ITSS-IoE), 2021
Text mining applications became important in various intelligent tasks. Text documents are the mo... more Text mining applications became important in various intelligent tasks. Text documents are the most materials that record many important procedures in various worldwide organizations and different people cultures. Text poetry is an important type of people culture and education domains media. Arabic text poems classification is a few experimented fields, however, it has an important presence and special influence. Both new and ancient Arabic poetry has the same unique approach for rhythmical harmony measure, which can be used for identifying Arabic poems types. Deep learning as a machine learning method has many distinctive achievements in many areas, as well as, text classification tasks. In this paper, Arabic poetry text is categorized. A customized feature selection is proposed, which is fused with a clustering technique for enhancing models efficiency. Deep learning has experimented alongside two popular machine learning techniques; support vector machine and decision tree. The proposed feature extraction method has achieved high accuracy with all three techniques. The results are better than many related works.
: This report contains a set of nomographs which can be used to estimate the average annual solar... more : This report contains a set of nomographs which can be used to estimate the average annual solar fraction for solar space and water heating at a large number of DOD facilities. The solar fraction estimated from the nomograph is in close agreement with F-Chart 3.0 and allows for variation of the following parameters: annual load, collector area, collector transmittance-absorptance coefficient, and collector overall loss coefficient. (Author)
IOP Conference Series: Earth and Environmental Science, 2021
Indonesia, in an increasingly modern era of globalization, is also increasingly changing people’s... more Indonesia, in an increasingly modern era of globalization, is also increasingly changing people’s lifestyles into entirely instant. The pattern of consuming fast food due to dense activities without considering the effects caused by these foods is one kind of modern lifestyle in Indonesia. Cancer is a disease that is quite malignant and feared by many people. In Jakarta, the prevalence is moderate for cancer, which is 1.9%, with the number of hospitals in West Jakarta, namely the hospital. Dharmais hospital, which is a national cancer centre in Jakarta. Therefore, due to limited hospital facilities and to help people living with cancer at the same time help provide temporary shelter while waiting for a therapeutic schedule at the hospital and also help cure cancer patients by applying the healing environment situation through this thesis entitled Planning a Cancer Shelter with Healing Approach Environment in the Dharmais hospital area, West Jakarta.
International Journal of Software Engineering and Computer Systems, 2021
Alzheimer’s disease (AD) is a progressive neurodegenerative disorder. It can cause a massive impa... more Alzheimer’s disease (AD) is a progressive neurodegenerative disorder. It can cause a massive impact on a patient's memory and mobility. As this disease is irreversible, early diagnosis is crucial for delaying the symptoms and adjusting the patient's lifestyle. Many machine learning (ML) and deep learning (DL) based-approaches have been proposed to accurately predict AD before its symptoms onset. However, finding the most effective approach for AD early prediction is still challenging. This review explored 24 papers published from 2018 until 2021. These papers have proposed different approaches using state of the art machine learning and deep learning algorithms on different biomarkers to early detect AD. The review explored them from different perspectives to derive potential research gaps and draw conclusions and recommendations. It classified these recent approaches in terms of the learning technique used and AD biomarkers. It summarized and compared their findings, and de...
International Journal of Advanced Trends in Computer Science and Engineering, 2021
The aim of cryptography is to convert plaintext into ciphertext which can be transmitted via inse... more The aim of cryptography is to convert plaintext into ciphertext which can be transmitted via insecure communication channels, so that, it impossible this ciphertext cannot be used for plaintext reproduction without knowing the corresponding key. Certain current Laplace transformation-based encryption methods have been proven to exhibit various security defects, such as the size of the secret key used for decryption usually greater than the size of the Plaintext, because that the secret key represents the quotient of Laplace transform values on 26, and these values larger than plaintext values. Therefore ,the encryption process is not important, as well as the possibility of obtaining the plaintext without knowing the secret key. To solve this problem, this paper proposes a new scheme cryptosystem based on Laplace Transform with using substitution boxes. The message is encrypted in many cycles, the secret key is added in each cycle and resultants values from the Laplace transform are substituting with the corresponding values from the substitution box that would be determined based on quotient and remainder values of Laplace transform values on block length. The security analysis and statistical results demonstrate that the proposed scheme provides a higher security level against different cryptographic attacks.
ArXiv, 2017
Communication tools make the world like a small village and as a consequence people can contact w... more Communication tools make the world like a small village and as a consequence people can contact with others who are from different societies or who speak different languages. This communication cannot happen effectively without Machine Translation because they can be found anytime and everywhere. There are a number of studies that have developed Machine Translation for the English language with so many other languages except the Arabic it has not been considered yet. Therefore we aim to highlight a roadmap for our proposed translation machine to provide an enhanced Arabic English translation based on Semantic.
Bio inspired algorithms are meta-heuristic optimization algorithm that mimics the intelligence fe... more Bio inspired algorithms are meta-heuristic optimization algorithm that mimics the intelligence features from biologic behavior in animal , bird, fish and so on. Bio inspired algorithms considered as a major subset of nature inspired algorithm. They become very important in computing a wide range of applications in different domains .The main goal of this paper is to make a literature survey of some recent bio inspired algorithms to investigate the reasonable performance of the current algorithms and predicting suitable algorithms for solving optimization problems. In this paper, some recent research papers of bio inspired algorithms are summarized such as bat algorithm (BA), cuckoo optimization algorithm (COA) , krill herd algorithm (KHA), dolphin echolocation algorithm (DEA), grey wolf algorithm (GWA) and crow search algorithm (CSA).The paper focuses on algorithms concepts, behavior ,principles , mathematical models and algorithms steps. In addition to experiments evaluation and th...
Asian Journal of Research in Computer Science, 2021
The enormous increase in the use of the Internet in daily life has provided an opportunity for th... more The enormous increase in the use of the Internet in daily life has provided an opportunity for the intruder attempt to compromise the security principles of availability, confidentiality, and integrity. As a result, organizations are working to increase the level of security by using attack detection techniques such as Network Intrusion Detection System (NIDS), which monitors and analyzes network flow and attacks detection. There are a lot of researches proposed to develop the NIDS and depend on the dataset for the evaluation. Datasets allow evaluating the ability in detecting intrusion behavior. This paper introduces a detailed analysis of benchmark and recent datasets for NIDS. Specifically, we describe eight well-known datasets that include: KDD99, NSL-KDD, KYOTO 2006+, ISCX2012, UNSW-NB 15, CIDDS-001, CICIDS2017, and CSE-CIC-IDS2018. For each dataset, we provide a detailed analysis of its instances, features, classes, and the nature of the features. The main objective of this pa...
Research Square (Research Square), Mar 11, 2024
The pervasiveness of big data has revolutionized the landscape of information technology (IT), of... more The pervasiveness of big data has revolutionized the landscape of information technology (IT), offering a wealth of insights and opportunities for various sectors, including healthcare, education, and the Internet of Things (IoT). However, the sheer volume and complexity of big data pose challenges in extracting meaningful knowledge. To address this, we propose a novel model for optimal sample selection, enabling e cient extraction of representative subsets from big data. The proposed model, based on optimal jumps, dynamically adapts the clustering process to enhance the e ciency of data sampling. We employ the Adjusted Rand Index (ARI) to evaluate the similarity between clusters and guide the selection of new data in each iteration This model holds the potential to signi cantly enhance the utilization of big data while reducing computational demands. The proposed could run on big datasets and the samples taken represents the dataset.
Lecture notes on data engineering and communications technologies, 2024
Lecture notes on data engineering and communications technologies, 2024
Mağallaẗ ğāmiʿaẗ Ṣanʿāʾ li-l-ʿulūm al-taṭbīqiyyaẗ wa-al-tiknūlūğiyā, Feb 24, 2024
In today's world, social media has become one of the most accessible sources of news for people w... more In today's world, social media has become one of the most accessible sources of news for people worldwide due to its low cost, easy accessibility, and rapid dissemination. However, the harmful effects of fake news on individuals and society have been evident for a long time. Despite the challenges in detecting false information, numerous scholars are working to understand the issue and its characteristics. The purpose of this paper is to analyze contemporary frameworks that make use of different machine learning techniques in order to further our understanding of false news identification. The efficiency of these frameworks in recognizing and halting the spread of false information may be compared by examining various methods. A particular technique was used in the review process to provide a thorough and instructive assessment. Even though a lot of research has been done to identify false news, more can be done in the future. These studies have many limitations such as biased data, adaptability, credibility analysis and the news is only categorized as legitimate or unauthentic by their solutions. Nevertheless, a system of ratings or scores to assess the reliability of news is necessary for a workable approach.
مجلة جامعة صنعاء للعلوم التطبيقية والتكنولوجيا
The field of sentiment analysis of Arabic scripts remains a major challenge due to the features, ... more The field of sentiment analysis of Arabic scripts remains a major challenge due to the features, characteristics, and complexity of the Arabic language. Few studies on Arabic Sentiment Analysis (ASA) have been conducted to the best of our knowledge when compared to English or other Latin languages. In addition, for ASA, very few studies have been conducted regarding the comments of the users (customers) of the apps available on the Google Play Store within various mobile application reviews. Most of the current studies have been conducted on datasets collected from Twitter user comments. In this paper, we propose a new approach to the analysis of sentiment in Arabic script based on the comments dataset of users of some mobile applications available on the Google Play Store. The proposed approach involves improving algorithms such as the Levenshtein distance (LD) algorithm for data preprocessing and then combining it with the K-Nearest Neighbor (K-NN) algorithm. Through the proposed ...
2023 3rd International Conference on Emerging Smart Technologies and Applications (eSmarTA)
2022 2nd International Conference on Emerging Smart Technologies and Applications (eSmarTA)
2022 2nd International Conference on Emerging Smart Technologies and Applications (eSmarTA)
International Journal of Computer Sciences and Engineering
International Journal of Intelligent Networks
Design Engineering, Nov 27, 2021
2021 International Conference on Intelligent Technology, System and Service for Internet of Everything (ITSS-IoE), 2021
Text mining applications became important in various intelligent tasks. Text documents are the mo... more Text mining applications became important in various intelligent tasks. Text documents are the most materials that record many important procedures in various worldwide organizations and different people cultures. Text poetry is an important type of people culture and education domains media. Arabic text poems classification is a few experimented fields, however, it has an important presence and special influence. Both new and ancient Arabic poetry has the same unique approach for rhythmical harmony measure, which can be used for identifying Arabic poems types. Deep learning as a machine learning method has many distinctive achievements in many areas, as well as, text classification tasks. In this paper, Arabic poetry text is categorized. A customized feature selection is proposed, which is fused with a clustering technique for enhancing models efficiency. Deep learning has experimented alongside two popular machine learning techniques; support vector machine and decision tree. The proposed feature extraction method has achieved high accuracy with all three techniques. The results are better than many related works.
: This report contains a set of nomographs which can be used to estimate the average annual solar... more : This report contains a set of nomographs which can be used to estimate the average annual solar fraction for solar space and water heating at a large number of DOD facilities. The solar fraction estimated from the nomograph is in close agreement with F-Chart 3.0 and allows for variation of the following parameters: annual load, collector area, collector transmittance-absorptance coefficient, and collector overall loss coefficient. (Author)
IOP Conference Series: Earth and Environmental Science, 2021
Indonesia, in an increasingly modern era of globalization, is also increasingly changing people’s... more Indonesia, in an increasingly modern era of globalization, is also increasingly changing people’s lifestyles into entirely instant. The pattern of consuming fast food due to dense activities without considering the effects caused by these foods is one kind of modern lifestyle in Indonesia. Cancer is a disease that is quite malignant and feared by many people. In Jakarta, the prevalence is moderate for cancer, which is 1.9%, with the number of hospitals in West Jakarta, namely the hospital. Dharmais hospital, which is a national cancer centre in Jakarta. Therefore, due to limited hospital facilities and to help people living with cancer at the same time help provide temporary shelter while waiting for a therapeutic schedule at the hospital and also help cure cancer patients by applying the healing environment situation through this thesis entitled Planning a Cancer Shelter with Healing Approach Environment in the Dharmais hospital area, West Jakarta.
International Journal of Software Engineering and Computer Systems, 2021
Alzheimer’s disease (AD) is a progressive neurodegenerative disorder. It can cause a massive impa... more Alzheimer’s disease (AD) is a progressive neurodegenerative disorder. It can cause a massive impact on a patient's memory and mobility. As this disease is irreversible, early diagnosis is crucial for delaying the symptoms and adjusting the patient's lifestyle. Many machine learning (ML) and deep learning (DL) based-approaches have been proposed to accurately predict AD before its symptoms onset. However, finding the most effective approach for AD early prediction is still challenging. This review explored 24 papers published from 2018 until 2021. These papers have proposed different approaches using state of the art machine learning and deep learning algorithms on different biomarkers to early detect AD. The review explored them from different perspectives to derive potential research gaps and draw conclusions and recommendations. It classified these recent approaches in terms of the learning technique used and AD biomarkers. It summarized and compared their findings, and de...
International Journal of Advanced Trends in Computer Science and Engineering, 2021
The aim of cryptography is to convert plaintext into ciphertext which can be transmitted via inse... more The aim of cryptography is to convert plaintext into ciphertext which can be transmitted via insecure communication channels, so that, it impossible this ciphertext cannot be used for plaintext reproduction without knowing the corresponding key. Certain current Laplace transformation-based encryption methods have been proven to exhibit various security defects, such as the size of the secret key used for decryption usually greater than the size of the Plaintext, because that the secret key represents the quotient of Laplace transform values on 26, and these values larger than plaintext values. Therefore ,the encryption process is not important, as well as the possibility of obtaining the plaintext without knowing the secret key. To solve this problem, this paper proposes a new scheme cryptosystem based on Laplace Transform with using substitution boxes. The message is encrypted in many cycles, the secret key is added in each cycle and resultants values from the Laplace transform are substituting with the corresponding values from the substitution box that would be determined based on quotient and remainder values of Laplace transform values on block length. The security analysis and statistical results demonstrate that the proposed scheme provides a higher security level against different cryptographic attacks.
ArXiv, 2017
Communication tools make the world like a small village and as a consequence people can contact w... more Communication tools make the world like a small village and as a consequence people can contact with others who are from different societies or who speak different languages. This communication cannot happen effectively without Machine Translation because they can be found anytime and everywhere. There are a number of studies that have developed Machine Translation for the English language with so many other languages except the Arabic it has not been considered yet. Therefore we aim to highlight a roadmap for our proposed translation machine to provide an enhanced Arabic English translation based on Semantic.
Bio inspired algorithms are meta-heuristic optimization algorithm that mimics the intelligence fe... more Bio inspired algorithms are meta-heuristic optimization algorithm that mimics the intelligence features from biologic behavior in animal , bird, fish and so on. Bio inspired algorithms considered as a major subset of nature inspired algorithm. They become very important in computing a wide range of applications in different domains .The main goal of this paper is to make a literature survey of some recent bio inspired algorithms to investigate the reasonable performance of the current algorithms and predicting suitable algorithms for solving optimization problems. In this paper, some recent research papers of bio inspired algorithms are summarized such as bat algorithm (BA), cuckoo optimization algorithm (COA) , krill herd algorithm (KHA), dolphin echolocation algorithm (DEA), grey wolf algorithm (GWA) and crow search algorithm (CSA).The paper focuses on algorithms concepts, behavior ,principles , mathematical models and algorithms steps. In addition to experiments evaluation and th...
Asian Journal of Research in Computer Science, 2021
The enormous increase in the use of the Internet in daily life has provided an opportunity for th... more The enormous increase in the use of the Internet in daily life has provided an opportunity for the intruder attempt to compromise the security principles of availability, confidentiality, and integrity. As a result, organizations are working to increase the level of security by using attack detection techniques such as Network Intrusion Detection System (NIDS), which monitors and analyzes network flow and attacks detection. There are a lot of researches proposed to develop the NIDS and depend on the dataset for the evaluation. Datasets allow evaluating the ability in detecting intrusion behavior. This paper introduces a detailed analysis of benchmark and recent datasets for NIDS. Specifically, we describe eight well-known datasets that include: KDD99, NSL-KDD, KYOTO 2006+, ISCX2012, UNSW-NB 15, CIDDS-001, CICIDS2017, and CSE-CIC-IDS2018. For each dataset, we provide a detailed analysis of its instances, features, classes, and the nature of the features. The main objective of this pa...