Hamza Altarturi - Contact

Articles

Web content topic modeling using LDA and HTML tags

2023 | PeerJ Computer Science

An immense volume of digital documents exists online and offline with content that can offer useful information and insights. Utilizing topic modeling enhances the analysis and understanding of digital documents. Topic modeling discovers latent semantic structures or topics within a set of digital textual documents. The Internet of Things, Blockchain, recommender system, and search engine optimization applications use topic modeling to handle data mining tasks, such as classification and clustering. The usefulness of topic models depends on the quality of …

HOOPOE: High Performance and Efficient Anonymous Handover Authentication Protocol for Flying Out of Zone UAVs

2023 | IEEE Transactions on Vehicular Technology

The unmanned aerial vehicles (UAVs) in military and civilian systems access sensitive data via cellular networks and are ubiquitous. Therefore, the number of handovers may increase, and the process of sharing authentication keys between drones to new drones may be vulnerable to eavesdropping due to the wireless connectivity. For example, a UAV initially served by cell A may be handed over to cell B after a certain point. Therefore, Security and privacy concerns raise if …

A bibliometric and content analysis of technological advancement applications in agricultural e-commerce

2023 | Electronic Commerce Research

Given the severe difficulties and challenges being faced during the current COVID-19 pandemic, agribusinesses must consider alternative means to market and sell agriproducts using e-commerce and advanced technologies. Agricultural e-commerce that utilizes advanced technologies can promote sustainable economic growth and gender equality and, therefore, helps achieve the Sustainable Development Goals. It also allows farmers access to new markets where …

Ground Truth Dataset: Objectionable Web Content

2022 | Data

Cyber parental control aims to filter objectionable web content and prevent children from being exposed to harmful content. Succeeding in detecting and blocking objectionable content depends heavily on the accuracy of the topic model. A reliable ground truth dataset is essential for building effective cyber parental control models and validation of new detection methods. The ground truth is the measurement for labeling objectionable and unobjectionable websites of the cyber parental control dataset. The lack of publicly accessible datasets with a reliable ground truth has prevented a fair …

Fault tolerance in big data storage and processing systems: A review on challenges and solutions

2022 | Ain Shams Engineering Journal

Big data systems are sufficiently stable to store and process a massive volume of rapidly changing data. However, big data systems are composed of large-scale hardware resources that make their subspecies easily fail. Fault tolerance is the main property of such systems because it maintains availability, reliability, and constant performance during faults. Achieving an efficient fault tolerance solution in a big data system is challenging because fault tolerance must meet some constraints …

Applications of financial technology in Islamic finance: A systematic bibliometric review

2021 | Artificial Intelligence And Islamic Finance

The latest developments in technology and regulations have revolutionised many industries, which is especially true for finance in general and Islamic finance in particular. New technology and financial market reforms have expanded, created new markets, and disrupted many markets. While the financial intermediation’s primary goals have not changed, new technologies and market forces have affected the method and structure of the process. New technology, …

Experimental analysis in Hadoop MapReduce: A closer look at fault detection and recovery techniques

2021 | Sensors

Hadoop MapReduce reactively detects and recovers faults after they occur based on the static heartbeat detection and the re-execution from scratch techniques. However, these techniques lead to excessive response time penalties and inefficient resource consumption during detection and recovery. Existing fault-tolerance solutions intend to mitigate the limitations without considering critical conditions such as fail-slow faults, the impact of faults at various infrastructure levels …

A preliminary study of cyber parental control and its methods

2020 | IEEE Conference on Application, Information and Network Security (AINS)

The growing Internet accessibility from various places and devices makes a vast amount of web content, including objectionable materials, available to users. These objectionable contents, including, for example, pornography, cyberbullying, sexual abuse, violence, hatred, gambling, and drugs endanger children on the Internet. More than half of the Internet children users have accidentally seen objectionable web contents. This problem has motivated the academia and industry to develop parental control tools for web content filtering. A few studies demonstrate the significance …

Cyber parental control: A bibliometric study

2020 | Children and Youth Services Review

Cyber parental control is a multidisciplinary field that aims to provide a safe Internet environment for children by authorizing parents or guardians to practice control on their children in using Internet access. Literature investigates and reviews cyber parental control from different perspectives, such as the risks associated with the cyber network, the roles of parents, the psychological and legal implications, and the technological aspects. However, there is a lack of studies on the bibliometric analysis report that demonstrates the research trend in cyber parental control This study aims to present a thorough …

A requirement engineering model for big data software

2017 | IEEE Conference on Big Data and Analytics (ICBDA)

Most prevailing software engineering methodologies assume that software systems are developed from scratch to capture business data and subsequently generate reports. Nowadays, massive data may exist even before software systems are developed. These data may also be freely available on Internet or may present in silos in organizations. The advancement in artificial intelligence and computing power has also prompted the need for big data analytics to unleash more business values to support evidence-based decisions. Some business values are less evident than others…