[PDF][PDF] A comprehensive overview of artificial intelligence tends in education

B Namatherdhala, N Mazher… - … Research Journal of …, 2022 - researchgate.net
Artificial Intelligence technology is invading human life with its numerous leverages. Like all
other fields, education also adopted AI tools and techniques to enhance student learning …

A survey on trust management for Internet of Things

Z Yan, P Zhang, AV Vasilakos - Journal of network and computer …, 2014 - Elsevier
Abstract Internet of Things (IoT) is going to create a world where physical objects are
seamlessly integrated into information networks in order to provide advanced and intelligent …

Offensive language detection on social media based on text classification

P Hajibabaee, M Malekzadeh… - 2022 IEEE 12th …, 2022 - ieeexplore.ieee.org
There is a concerning rise of offensive language on the content generated by the crowd over
various social platforms. Such language might bully or hurt the feelings of an individual or a …

Review of deep learning methods for automated sleep staging

M Malekzadeh, P Hajibabaee… - 2022 IEEE 12th …, 2022 - ieeexplore.ieee.org
In order to diagnose sleep problems, it is critical to correctly identify sleep stages which is a
labor-intensive task. Due to rising data volumes, advanced algorithms, and improvements in …

Tweet-based bot detection using big data analytics

A Derhab, R Alawwad, K Dehwah, N Tariq… - IEEE …, 2021 - ieeexplore.ieee.org
Twitter is one of the most popular micro-blogging social media platforms that has millions of
users. Due to its popularity, Twitter has been targeted by different attacks such as spreading …

Towards an online risk mitigation framework for political brands subject to computational propaganda

R Robertson, C Meintjes - Communicatio, 2021 - Taylor & Francis
The influence of computational propaganda on democratic processes globally has
necessitated the exploration of mitigation strategies for political brands. The risk associated …

Multivocal Literature Review on the Security of DevSecOp

Z Kanstantsin - Asian Journal of Research in Computer …, 2022 - publish7promo.com
DevOps revolutionize the software development lifecycle by providing agile and fast-paced
solutions. DevOps ignores security prospects since it focuses only on increasing …

Enhancing Detection Rates in Cloud Environments Using Support Vector Machine Classifiers

HR Mahmood, OA Fadare, F Al-Turjman - Smart Infrastructures in the IoT …, 2025 - Springer
This study introduces an intelligent approach to boost detection in cloud environments,
specifically focusing on improving detection rates. The proposed technique implements a …

Cybersecurity Attacks in Celluler-V2X Communicaiton Networks

N Mazher, M Alhaddad, O Shagdar - Authorea Preprints, 2022 - advance.sagepub.com
Vehicles in the current era can communicate with other vehicles, roadside units, and
networks. This communication is collaboratively called Vehicle to Everything (V2X) …

SMS Based Gas Leakage and Fire Detection Alert System

N Mazher, M Latif, J Asad, F Nawaz - Authorea Preprints, 2022 - advance.sagepub.com
Safety is the foremost aspect in today" s world. In this world of technology, people need
technology to help them in danger conditions. Gas leakage becomes a severe issue that …