default search action
Mohammad Alshayeji
Person information
- affiliation: Kuwait University, Kuwait City, Kuwait
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Mohammad H. Alshayeji:
Alzheimer's disease detection and stage identification from magnetic resonance brain images using vision transformer. Mach. Learn. Sci. Technol. 5(3): 35011 (2024) - 2023
- [j38]Mohammad H. Alshayeji, Sa'ed Abed:
Lung cancer classification and identification framework with automatic nodule segmentation screening using machine learning. Appl. Intell. 53(16): 19724-19741 (2023) - [j37]Mohammad H. Alshayeji, Jassim Al-Buloushi:
Breast Cancer Classification Using Concatenated Triple Convolutional Neural Networks Model. Big Data Cogn. Comput. 7(3): 142 (2023) - [j36]Mohammad H. Alshayeji, Silpa ChandraBhasi Sindhu, Sa'ed Abed:
Early detection of diabetic foot ulcers from thermal images using the bag of features technique. Biomed. Signal Process. Control. 79(Part): 104143 (2023) - [j35]Mohammad H. Alshayeji, Silpa ChandraBhasi Sindhu, Sa'ed Abed:
Viral genome prediction from raw human DNA sequence samples by combining natural language processing and machine learning techniques. Expert Syst. Appl. 218: 119641 (2023) - [j34]Mohammad H. Alshayeji, Sa'ed Abed, Silpa ChandraBhasi Sindhu:
Two-stage framework for diabetic retinopathy diagnosis and disease stage screening with ensemble learning. Expert Syst. Appl. 225: 120206 (2023) - [j33]Mohammad H. Alshayeji:
Early Thyroid Risk Prediction by Data Mining and Ensemble Classifiers. Mach. Learn. Knowl. Extr. 5(3): 1195-1213 (2023) - [j32]Mohammad H. Alshayeji:
CAD system for epileptic seizure detection from EEG through image processing and SURF-BOF technique. Mach. Learn. Sci. Technol. 4(4): 45029 (2023) - 2022
- [j31]Mohammad H. Alshayeji, Silpa ChandraBhasi Sindhu, Sa'ed Abed:
CAD systems for COVID-19 diagnosis and disease stage classification by segmentation of infected regions from CT images. BMC Bioinform. 23(1): 264 (2022) - [j30]Mohammad H. Alshayeji, Hanem Ellethy, Sa'ed Abed, Renu Gupta:
Computer-aided detection of breast cancer on the Wisconsin dataset: An artificial neural networks approach. Biomed. Signal Process. Control. 71(Part): 103141 (2022) - [j29]Mohammad Alshayeji, Bader BehBehani, Imtiaz Ahmad:
Spark-based parallel processing whale optimization algorithm. Concurr. Comput. Pract. Exp. 34(4) (2022) - [j28]Mohammad H. Alshayeji, Mousa AlSulaimi, Sa'ed Abed, Reem Jaffal:
Network Intrusion Detection With Auto-Encoder and One-Class Support Vector Machine. Int. J. Inf. Secur. Priv. 16(1): 1-18 (2022) - [j27]Mohammad H. Alshayeji, Sa'ed Abed:
Enhanced video-on-demand security in cloud computing against insider and outsider threats. Int. J. Secur. Networks 17(1): 48-55 (2022) - [j26]Mohammad H. Alshayeji, Suood Abdulaziz Al-Roomi, Sa'ed Abed:
Efficient hand vein recognition using local keypoint descriptors and directional gradients. Multim. Tools Appl. 81(11): 15687-15705 (2022) - 2021
- [j25]Sa'ed Abed, Reem Jaffal, Bassam Jamil Mohd, Mohammad H. Al Shayeji:
An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices. Clust. Comput. 24(4): 3065-3084 (2021) - [j24]Areej Ahmad Abdelaal, Sa'ed Abed, Mohammad Alshayeji, Mohammad Al-laho:
Customized frequent patterns mining algorithms for enhanced Top-Rank-K frequent pattern mining. Expert Syst. Appl. 169: 114530 (2021) - [j23]Sa'ed Abed, Reem Jaffal, Bassam Jamil Mohd, Mohammad Alshayeji:
Performance evaluation of the SM4 cipher based on field-programmable gate array implementation. IET Circuits Devices Syst. 15(2): 121-135 (2021) - [j22]Sa'ed Abed, Bassam Jamil Mohd, Thaier Hayajneh, Mohammad H. Alshayeji:
Hardware Trojan detection for lightweight ciphers implemented on field-programmable gate arrays using the replay algorithm. Int. J. Circuit Theory Appl. 49(11): 3607-3629 (2021) - [j21]Sa'ed Abed, Areej A. Abdelaal, Mohammad H. Alshayeji, Imtiaz Ahmad:
SAT-based and CP-based declarative approaches for Top-Rank-K closed frequent itemset mining. Int. J. Intell. Syst. 36(1): 112-151 (2021) - [j20]Mohammad Alshayeji, Jassim Al-Buloushi, Ali Ashkanani, Sa'ed Abed:
Enhanced brain tumor classification using an optimized multi-layered convolutional neural network architecture. Multim. Tools Appl. 80(19): 28897-28917 (2021) - [j19]Bassam Jamil Mohd, Sa'ed Abed, Thaier Hayajneh, Mohammad H. Alshayeji:
Run-Time Monitoring and Validation Using Reverse Function (RMVRF) for Hardware Trojans Detection. IEEE Trans. Dependable Secur. Comput. 18(6): 2689-2704 (2021) - 2020
- [j18]Sa'ed Abed, Mohammed H. Ali, Mohammad H. Al Shayeji:
Enhanced GPU-based anti-noise hybrid edge detection method. Comput. Syst. Sci. Eng. 35(1) (2020)
2010 – 2019
- 2019
- [j17]Sahel Alouneh, Sa'ed Abed, Mohammad H. Al Shayeji, Raed Mesleh:
A comprehensive study and analysis on SAT-solvers: advances, usages and achievements. Artif. Intell. Rev. 52(4): 2575-2601 (2019) - [j16]Sa'ed Abed, Mohammad H. Al Shayeji, Fahad Ebrahim:
A secure and energy-efficient platform for the integration of Wireless Sensor Networks and Mobile Cloud Computing. Comput. Networks 165 (2019) - [j15]Yasser H. Khalil, Mohammad Alshayeji, Imtiaz Ahmad:
Distributed Whale Optimization Algorithm based on MapReduce. Concurr. Comput. Pract. Exp. 31(1) (2019) - [j14]Sa'ed Abed, Suood Abdulaziz Al-Roomi, Mohammad H. Al Shayeji:
Efficient cover image selection based on spatial block analysis and DCT embedding. EURASIP J. Image Video Process. 2019: 87 (2019) - [j13]Sa'ed Abed, Bassam Jamil Mohd, Mohammad H. Al Shayeji:
Implementation of speech feature extraction for low-resource devices. IET Circuits Devices Syst. 13(6): 863-872 (2019) - [j12]Sa'ed Abed, Reem Jaffal, Bassam Jamil Mohd, Mohammad Alshayeji:
FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher. Sensors 19(4): 913 (2019) - 2018
- [j11]Mohammad H. Alshayeji, Mohammad A. Al-Rousan, Hanem Ellethy, Sa'ed Abed:
An efficient multiple sclerosis segmentation and detection system using neural networks. Comput. Electr. Eng. 71: 191-205 (2018) - 2017
- [j10]Sa'ed Abed, Mohammed H. Ali, Mohammad H. Al Shayeji:
An adaptive edge detection operator for noisy images based on a total variation approach restoration. Comput. Syst. Sci. Eng. 32(1) (2017) - [j9]Sa'ed Abed, Mohammed H. Ali, Mohammad H. Al Shayeji:
An adaptive edge detection operator for noisy images based on a total variation approach restoration. Comput. Syst. Sci. Eng. 32(3) (2017) - [j8]Sa'ed Abed, Imtiaz Ahmad, Mohammad H. Al Shayeji, Sari Sultan:
Automatic verification of single-electron transistor arrays based on multiway decision graphs. IET Circuits Devices Syst. 11(4): 395-403 (2017) - [j7]Mohammad Al-Rousan, Elham Al-Shara, Yaser Jararweh, Mohammad H. Alshayeji:
Cloudlet-based ad hoc mobile cloud computing: design and evaluation. Int. J. Embed. Syst. 9(5): 456-463 (2017) - [j6]Mohammad Alshayeji, Suood Abdulaziz Al-Roomi, Sa'ed Abed:
Optic disc detection in retinal fundus images using gravitational law-based edge detection. Medical Biol. Eng. Comput. 55(6): 935-948 (2017) - [c4]Sa'ed Abed, Mohammad H. Al Shayeji, Zahra'a Abdullah, Zainab AlSaeed:
Fault tolerance design for NoCs: partial virtual-channel sharing. ICSCA 2017: 233-238 - 2016
- [j5]Sa'ed Abed, Suood Abdulaziz Al-Roomi, Mohammad Alshayeji:
Effective optic disc detection method based on swarm intelligence techniques and novel pre-processing steps. Appl. Soft Comput. 49: 146-163 (2016) - [j4]Sa'ed Abed, Mohammad Alshayeji, Sari Sultan, Nesreen Mohammad:
Hybrid approach based on partial tag comparison technique and search methods to improve cache performance. IET Comput. Digit. Tech. 10(2): 69-76 (2016) - [j3]Mohammad H. Alshayeji, Suood Abdulaziz Al-Roomi, Sa'ed Abed:
A high-capacity and secure least significant bit embedding approach based on word and letter frequencies. Secur. Commun. Networks 9(18): 5764-5788 (2016) - 2015
- [j2]Mohammad Alshayeji, Desiree Noela Dias, M. D. Samrajesh:
Enhanced Chunk Regulation Algorithm for Superior QoS in Heterogeneous P2P Video on Demand. J. Networks 10(10): 567-578 (2015) - 2012
- [c3]Mohammad H. Al Shayeji, Desiree Noela Dias, M. D. Samrajesh:
Effective regulation of chunks for improved video continuity in P2P Video-on-Demand. ICON 2012: 191-196 - [i1]Mohammad H. Al Shayeji, AbdulRahman R. Al-Azmi, AbdulAziz R. Al-Azmi, M. D. Samrajesh:
Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Networks. CoRR abs/1210.1686 (2012)
2000 – 2009
- 2000
- [j1]Cyrus Shahabi, Mohammad Alshayeji:
Super-Streaming: A New Object Delivery Paradigm for Continuous Media Servers. Multim. Tools Appl. 11(1): 129-155 (2000)
1990 – 1999
- 1998
- [c2]Mohammad Alshayeji, Cyrus Shahabi:
Object Delivery in Distributed Continuous Media Servers. RIDE 1998: 92-99 - 1997
- [c1]Cyrus Shahabi, Mohammad Alshayeji, Shimeng Wang:
A Redundant Hierachical Structure for a Distributed Continuous Media Server. IDMS 1997: 51-64
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint