Publications by authors named "Shouki A Ebad"

Article Synopsis
  • Big data analytics is revolutionizing clinical decision-making by utilizing vast healthcare data to create evidence-based solutions, but it raises significant privacy and security concerns, especially regarding sensitive medical images stored in the cloud.
  • The proposed project aims to enhance patient care through a machine learning-based anomaly detection system for medical images, addressing current limitations in existing detection methods that struggle with resource consumption and real-time performance.
  • The research focuses on improving data processing techniques, including feature selection and handling missing values, employing advanced algorithms like recursive feature elimination and dynamic principal component analysis for more effective anomaly detection.
View Article and Find Full Text PDF

This study presents a Prairie Dog Optimization Algorithm with a Deep learning-assisted Aerial Image Classification Approach (PDODL-AICA) on UAV images. The PDODL-AICA technique exploits the optimal DL model for classifying aerial images into numerous classes. In the presented PDODL-AICA technique, the feature extraction procedure is executed using the EfficientNetB7 model.

View Article and Find Full Text PDF

Laryngeal cancer (LC) represents a substantial world health problem, with diminished survival rates attributed to late-stage diagnoses. Correct treatment for LC is complex, particularly in the final stages. This kind of cancer is a complex malignancy inside the head and neck region of patients.

View Article and Find Full Text PDF

Developing legally compliant systems is a challenging software engineering problem, especially in systems that are governed by law, such as healthcare information systems. This challenge comes from the ambiguities and domain-specific definitions that are found in governmental rules. Therefore, there is a significant business need to automatically analyze privacy texts, extract rules and subsequently enforce them throughout the supply chain.

View Article and Find Full Text PDF