default search action
Ghadah Aldehim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Rubina Rashid, Waqar Aslam, Romana Aziz, Ghadah Aldehim:
An Early and Smart Detection of Corn Plant Leaf Diseases Using IoT and Deep Learning Multi-Models. IEEE Access 12: 23149-23162 (2024) - [j18]Mashael M. Asiri, Ghadah Aldehim, Faiz Abdullah Alotaibi, Mrim M. Alnfiai, Mohammed Assiri, Ahmed Mahmud:
Short-Term Load Forecasting in Smart Grids Using Hybrid Deep Learning. IEEE Access 12: 23504-23513 (2024) - [j17]Sapiah Binti Sakri, Shakila Basheer, Zuhaira Muhammad Zain, Nurul Halimatul Asmak Ismail, Dua' Abdellatef Nassar, Ghadah Aldehim, Mais Ayman Alharaki:
An Improved Concatenation of Deep Learning Models for Predicting and Interpreting Ischemic Stroke. IEEE Access 12: 53189-53204 (2024) - [j16]Eman A. Al-Shahari, Ghadah Aldehim, Nabil Sharaf Almalki, Mohammed Assiri, Ahmed Sayed, Mrim M. Alnfiai:
Innovative Insect Detection and Classification for the Agricultural Sector Using Gannet Optimization Algorithm With Deep Learning. IEEE Access 12: 108041-108051 (2024) - [j15]Qamar Hafeez, Waqar Aslam, Romana Aziz, Ghadah Aldehim:
An Enhanced Fault Tolerance Algorithm for Optical Mark Recognition Using Smartphone Cameras. IEEE Access 12: 121305-121319 (2024) - [j14]Jasni Mohamad Zain, Mohammed Adam Kunna Azrag, Saiful Farik Mat Yatin, Ghadah Aldehim, Zuhaira Muhammad Zain, Hadil Shaiba, Nazik Alturki, Sapiah Binti Sakri, Azlinah Mohamed, Aqeel S. Jaber:
Kinetic Parameters Estimation of the Escherichia Coli (E. coli) Model by Garra Rufa-Inspired Optimization Algorithm (GRO). IEEE Access 12: 165889-165902 (2024) - [j13]Sahar Cherif, Hamdi Kchaou, Amel Ksibi, Ghadah Aldehim:
Medical diagnosis using interval type-2 fuzzy similarity measures. Clust. Comput. 27(8): 10455-10466 (2024) - [j12]Rami S. Alkhawaldeh, Bilal Al-Ahmad, Amel Ksibi, Nazeeh Ghatasheh, Evon M. O. Abu-Taieh, Ghadah Aldehim, Manel Ayadi, Samar M. Alkhawaldeh:
Correction: Convolution Neural Network Bidirectional Long Short-Term Memory for Heartbeat Arrhythmia Classification. Int. J. Comput. Intell. Syst. 17(1): 38 (2024) - [j11]Ali Nauman, Wali Ullah Khan, Ghadah Aldehim, Hamed Alqahtani, Nuha Alruwais, Mesfer Al Duhayyim, Kapal Dev, Hong Min, Lewis Nkenyereye:
Communication and computational resource optimization for Industry 5.0 smart devices empowered by MEC. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101870 (2024) - [j10]Mohammed Maray, Ghadah Aldehim, Abdulrahman Alzahrani, Faiz Abdullah Alotaibi, Safa Alsafari, Elham Abdullah Alghamdi, Manar Ahmed Hamza:
Deer Hunting Optimization with Deep Learning-Driven Automated Fabric Defect Detection and Classification. Mob. Networks Appl. 29(1): 176-186 (2024) - [j9]Shahzadi Bano, Weimei Zhi, Baozhi Qiu, Muhammad Raza, Nabila Sehito, Mian Muhammad Kamal, Ghadah Aldehim, Nuha Alruwais:
Self-paced ensemble and big data identification: a classification of substantial imbalance computational analysis. J. Supercomput. 80(7): 9848-9869 (2024) - 2023
- [j8]Noha Negm, Ghadah Aldehim, Faisal Mohammed Nafie, Radwa Marzouk, Mohammed Assiri, Mohamed Ibrahim Alsaid, Suhanda Drar, Sitelbanat Abdelbagi:
Intracranial Haemorrhage Diagnosis Using Willow Catkin Optimization With Voting Ensemble Deep Learning on CT Brain Imaging. IEEE Access 11: 75474-75483 (2023) - [j7]Ghadah Aldehim, Munya A. Arasi, Majdi Khalid, Sumayh S. Aljameel, Radwa Marzouk, Heba Mohsen, Ishfaq Yaseen, Sara Saadeldeen Ibrahim:
Gauss-Mapping Black Widow Optimization With Deep Extreme Learning Machine for Android Malware Classification Model. IEEE Access 11: 87062-87070 (2023) - [j6]Ghadah Aldehim, Mashael M. Asiri, Mohammed Aljebreen, Abdullah Mohamed, Mohammed Assiri, Sara Saadeldeen Ibrahim:
Tuna Swarm Algorithm With Deep Learning Enabled Violence Detection in Smart Video Surveillance Systems. IEEE Access 11: 95104-95113 (2023) - [j5]Anwer Mustafa Hilal, Shaha T. Al-Otaibi, Hany Mahgoub, Fahd N. Al-Wesabi, Ghadah Aldehim, Abdelwahed Motwakel, Mohammed Rizwanullah, Ishfaq Yaseen:
Deep learning enabled class imbalance with sand piper optimization based intrusion detection for secure cyber physical systems. Clust. Comput. 26(3): 2085-2098 (2023) - [j4]Rami S. Alkhawaldeh, Bilal Al-Ahmad, Amel Ksibi, Nazeeh Ghatasheh, Evon M. O. Abu-Taieh, Ghadah Aldehim, Manel Ayadi, Samar M. Alkhawaldeh:
Convolution Neural Network Bidirectional Long Short-Term Memory for Heartbeat Arrhythmia Classification. Int. J. Comput. Intell. Syst. 16(1): 197 (2023) - [j3]Saad Aljubayrin, Ghadah Aldehim, Nuha Alruwais, Khalid Mahmood, Mesfer Al Duhayyim, Hong Min, Lewis Nkenyereye, Wali Ullah Khan:
Dynamic offloading strategy for computational energy efficiency of wireless power transfer based MEC networks in industry 5.0. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101841 (2023)
2010 – 2019
- 2018
- [j2]Evon M. O. Abu-Taieh, Auhood Abdullah Alfaries, Shaha T. Al-Otaibi, Ghadah Aldehim:
Cyber Security Crime and Punishment: Comparative Study of the Laws of Jordan, Kuwait, Qatar, Oman, and Saudi Arabia. Int. J. Cyber Warf. Terror. 8(3): 46-59 (2018) - 2017
- [j1]Ghadah Aldehim, Wenjia Wang:
Determining appropriate approaches for using data in feature selection. Int. J. Mach. Learn. Cybern. 8(3): 915-928 (2017) - 2015
- [b1]Ghadah Aldehim:
Heuristic ensembles of filters for accurate and reliable feature selection. University of East Anglia, Norwich, UK, 2015 - 2014
- [c2]Ghadah Aldehim, Beatriz de la Iglesia, Wenjia Wang:
Heuristic Ensemble of Filters for Reliable Feature Selection. ICPRAM 2014: 175-182 - [c1]Ghadah Aldehim, Wenjia Wang:
Reliability and Effectiveness of Cross-Validation in Feature Selection. SGAI Conf. 2014: 179-184
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint